From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 7c
01ef7c2ed247c5a37f2b48742f7a610204e97f7c 01ef7c5c86f7903a9a3b133b1c38d68ba2534d38 01ef7cf2491a0f3f23eb3c73bbcd9b1bc022496e