From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 7e c3
017ec3d508885f32e9ea1fa158445875fe1272e6 017ec3e02fdddb9ee650d30955dd59ab9a654eb1 017ec3f2f0a07e4e3895c4b8e076b777c6b530df 017ec3f5e259c6c383cd023caa9cd83c11317a5c