From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 3b
01ef3b446cfb63d78125d5b85aa5ca93e57cca3c 01ef3ba04e215d48fd857e9360588af3ac8c9d75 01ef3bbe06bf99ce94301309f59e0ba6558badff 01ef3bde7ff14aec2fd9ced606a48b7e6a2472be