From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 7e b8
017eb8266c62ddd3613acb8895aa9c5d6d4d3a79 017eb84329c8d9a18eb48ce125b87a6ffae035ee 017eb87c47c68eac8f42d55ed664a13d58d8eda2 017eb898267d3fcd1f46daa7b0f168660e37c1b2 017eb8e60556fb8367985a40a72c3c52f7b0f6b0