From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 4e 71 f5
4e71f51ec1f39ae640b4af401f1c48787fb796a3 4e71f57002c33d61c4c435739f63ba0c426f7744 4e71f5893305d477988828057abd528b51f4320a