From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 10 38 72
103872131d65a825ebe0896ef96158af291a33e7 103872466607b812823bc6c2cb21ddae2824b12a 1038726a3bfe187d4db5b863397ecdd3de6020ac 1038726b4cb8a61e057ab156d27b8f9033ee6c87 103872c1c06974dbd7711360100d607f3dab5edd