From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 3e
01ef3e2bf0f92316824749e2e410ace0acb0110a 01ef3ea63a9be821cc761034c6afb6796de4b5a5 01ef3effc6cf03d059ae9f4350a3f0ff931c824f