From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 28 43 08
2843085a8374c5cfa68f2072db6b7753c49bd835 2843087d45c54ff01ff4d5858f6c0330de81e16f 2843088c9389b8e6d4655194cb68475bf05c69a7