From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 7e 4a
017e4a03f5f557c1e4bf5d829c127d90a7dc548d 017e4a7f25c452a00b22e78b11711290621df298 017e4aab63f08548b21c36c1bcdbbd38bd366695 017e4ada74c9fb26c1de43ff39de00f63f6548cf