From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse ca 3f 09
ca3f0952c320e9c1aa886428b0ae3cfde7fac14b ca3f099d963bd8b46de4f68cb2e6ad7dc59777b3 ca3f09eeffeb77bd3c58bd3186397a1694f4ccdd