From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 51
01ef513897413f76640ecbfd9ba86a2418c3fade 01ef51799736ec633eebf4ed2a7db193c162a7ed 01ef519cfafa36a6515dfc8f9f9be0008961e9ff 01ef51e3d026f90068526bc00e769512060cfa11