From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 7e 43
017e4372149f248b384e10771f924506f6d1f1a8 017e43ddfc97dd86779a6d4a3fba6438fea0d997 017e43e608267775f5e4a5b1962d715bf8a2201c 017e43eb37ca4cad8d97ee7e913c03607df6e2b4