From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 4e 71 a0
4e71a02f0d36cfd5916d6aae0b7985dcb2fe306c 4e71a05dbd2435f9f3f1681dced0b3fefb181250 4e71a062ec9edff219586bbcf3f412d2c7a66df0 4e71a0646f454c845822b3de58dc44eb06625325 4e71a0ec79a95261912cc3dbcd37411e6de781d3