From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 6e
01ef6e080f549be1d620a1af49c609840f01d481 01ef6e459fc711d040ad26536198fcd6198faee4 01ef6eb4059f88974e1ed05b3b24a460611e4658 01ef6edc3e3d100635905d94fbbbab54b8cdc091