From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse ca 3f 4c
ca3f4c120edc49cc3c325f3fe2a6a2ac08ec7023 ca3f4c40d52854b59aa26758d579116b4a55d3e3 ca3f4c6caf79ee545f18806584440b02a3b48f37 ca3f4c90c6036368d1d52aca52dfca087d43e992