From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 7e 46
017e46001df25373a0e97e34998c311bfa09d0c9 017e4601316aab77b2376dc5bb0534cbc8bd6dbd 017e4618ab4dfd469a17602a8d6e0fce7c4daa70 017e469920792cfe54a77677c642c1511a36000c 017e46fb48bc41ea2d314a0713bb9e22b87bb30e