From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 03 a4
cd03a40e035784e14623258e8f4cbac4a5c80c10 cd03a42d5efc242caf441e1abb0d024efb89fe1d cd03a44d2d480cb52bd4756b89c1b2c941a7998e cd03a48a3562ab2c92db51b16bdb5f8663a6f79b cd03a490db86a0a62b05ca2ba0acf5cd9b162697 cd03a49a3505501864b5e368724bb23791f4f03d cd03a4f33144a5633a3210cfcfe447cfe72c593c