From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 7e f4
017ef426820a5ea0fe4c5059553d64ad55c3a479 017ef43f94c8dc6dfcdb4be062cd8536abe44a73 017ef45c11b2d9269b3926a6da107426689d3704 017ef47d8d5722287875d23dd6019fad8c645d43 017ef4ec5918cfa3d033068e040e7d1c0d8495df