From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse ca 3f 7b
ca3f7b4de8f8af07e9100a1ce915ce8224dccb92 ca3f7ba3c75bfb03d504a3c54a8322131fb5c59a ca3f7bad67aab0f447bf609b6090fd3a59fdc0fa ca3f7bee7e0898c292a05cf24019b7e432138e51