From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 4e 71 84
4e71844985b631823fa5e08a81e8ddd686e56924 4e718471e23d9304bcd33318b91c170675b3e2c3 4e71847749f353ebeed7ef901222737099ff9480