From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 7e 58
017e580b33c099fb11f8641672ea4e614bb72f38 017e5885166be21fe0b68eafd4f0a2955684d67f 017e58cb2588bcd2bfd6a2b02ee9346ba12e3bde 017e58dad3be5ba1ae32f894b150bc84f0a376a7