From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 06
01ef062ee78f4f38aed3b564242609a8b0d66996 01ef0689a544fce79aa3e7bc03155f8ce2b646be 01ef06d44ef564d9144a1439c4f772487c8ff392 01ef06e8a8bd045e5edd920419997dc2f20ee71b