From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 2d
01ef2d267cd694cbc822c698032d47ec9bd3157e 01ef2d42f71d9a417513c235724b45653ca47b4e 01ef2de05ade23abb13684ed7dd053ef8e2d8a38 01ef2df5a9d47d15c2f1b3b6a83aa5e12a85b715