From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 43 df a7
43dfa716ca0ed14d8df3a92ec354167348722eb0 43dfa7343296b8a035b044051a44049e493208c1 43dfa7abe7579800df9d565fb8662aa6f0c2db2c 43dfa7f8dd60d67ac6a70ec68830645f43131112