From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 4e 71 b2
4e71b2143ad36eec85add69606ef9e4e30b1a2d5 4e71b2ce03211c20f91181cc3216048499287d9a 4e71b2fd31626c845884a49a5259bb57cc27e413