From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 7e 08
017e080b7acc387abeed8bfbd8d5920b91ac148f 017e08219af7febed4238b5877b6c827da5920af 017e084569df8f846eb15b04108b782e5ece955e 017e085b84d20279b31fe305e940aa72659e79b4 017e08c04abeac10798f17bd9a8a9bdee3510afb