From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse ca 3f c9
ca3fc907e3557fa9b342e48317759696eb228b16 ca3fc922f028057e5806b8d62d6bb6f62eb58b6e ca3fc95389456649b5769df17ff14a24ab01ad43