From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 7e 30
017e307fde79fa751e12c6441e351b6340bb556a 017e30a3887f3806d758c8e213c29c187d821279 017e30c2bfbcff934018e4c1f160c4af54210338 017e30fabcc67ee32a5e586f5decd61d21c23e9a