From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 fd ff
04fdff1869b44e51971fe0c70dac0410149d2922 04fdff74481a892921e7914ffb350388c630e3ba 04fdff8b2de0231d2df29f3df9840fc6fbdc34b1 04fdffe8aa0e1cfea8e0fb793e664c40ba9fe889