From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 7e d6
017ed639fa8ebf38c76db614d3b6fee0fe161df7 017ed6910f2c32414702a8a84105203244013dba 017ed6a64470e42b6ecd14314a5ce89ca432ae55