From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse b4 bf 3a
b4bf3ab232bf549914e4de611e9178f6ac17a588 b4bf3ad22092a069fefe2d49dacdaad06da6a307