From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse ca 3f bb
ca3fbb1419b3394606aeff9540f42d8efbcb6e64 ca3fbb31cd88dfbdce33d7bcc3f53185617a23a0 ca3fbb6cc186495179dcabe770e4e8b82ac64c76 ca3fbba3c4e80893715078773c12a61d613f910a ca3fbbaa5b1392c9c5d75a7f1c509e293a14c240