From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 5a
01ef5a4a8320a75f822e2999c57748497e69fff3 01ef5a81d00acdcb0aacb335d2469463f4861c7a 01ef5aa1660d73390c5b85f248e48a81e2d5d9aa 01ef5ae9b9935f5429facaae57c4311bf2ea7cbd