From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 74
01ef7417b2d49d493c7324fdbb7af52709dc1b48 01ef7428626bccd2c1fec78eff0d35db93bc5e14 01ef74563590bd4fbeff124a052ec053bc8d3188 01ef74a2c1b758f6bd229cf5060ed1ed8a2a2ac5 01ef74b6c2690966524b67aebd6944dc578e38e2 01ef74d24f1ace2716bc2453ba8480088418ef2a