From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 1d
01ef1d5b9c043426d651873df3d6edf9f1e9b4af 01ef1de321679455f06a2cfde48f3579c47d54c8