From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 19
01ef19bb497f2a7442f61c9fa123288adc2b1b18 01ef19c7d195478f9174411fa7ac4c3e6dd7cfbd 01ef19e70b4d130d6fe4abcbef2fdb39aa509e1d