From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 7e c7
017ec72cbfd741375bf5dbc31474c882172ee1d8 017ec791627c20d5418c55ed3ce0a7f1673e4ce7 017ec7b79f1cb002e1ef46a18bbf5e918a0d9f58