From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 62
01ef628dcc688c5f3a0e8476b43b343ffc0e3d9c 01ef62a8822c8d0e4ee6d44cc42b45ce87e662a0 01ef62ca36449aa703e5168b4952d628b02ec8f0 01ef62f20661ac60029e9cd8ff528922d8b4cb8d