From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 43 36 3b
43363b4104052e185c08280a44b16f083e5cfd4a 43363b4cbc97e2010d26768d2eec862d8d79ada5 43363b631ace214c7369dc6a46253ebd747d50bb 43363bc7f32f9150c1ae301db8be681ef0c7d476 43363bd074eccc8c966338d613326ad34b9cc397