From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 43 1b 20
431b2009740f8c448a865c31eb9719d34788a36d 431b204086e99ff9af06692a0942a33226c7082b 431b2063743e0a2b32c3c9048c9af84aabb3f22f 431b20656bbd1dbac96cc5a902df95d87d1a7403 431b2066e42d49dda8b80e2ae21e6e51f0dcd7ca 431b20a9c1967611d68136a51d42ca31520c298b