From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 03 b4
cd03b4182df8fe485c6c93ff6a8aea5b8443bf26 cd03b4770dace7c388696ae31254b5cae0cdb401 cd03b47f30756a99dda7c26daecef014964fbe3e