From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 27
01ef2754c2318561fcc1f198540d51c46b3ae776 01ef275d10727beaacf2a0b6e9a62fe676383899 01ef27679ce97875cc7965348442d715f6e3f07b 01ef276d4cdefa75c92127510096973eef3f7064 01ef27851cc9746a79af4e86c742545cfbade582 01ef27b1c08ae86f321c0875ff0d4fed28e9e0f7 01ef27ed8f67cbee8fc08ac96e756e7a5c14f544