From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 1b
01ef1b592241f6fbe9f308a5232bfeb5cb3fe74b 01ef1ba0e09468da098da2be5b02b052ad19d2f4 01ef1bcc274172c6101bb58b0451ece30aa879a7