From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 7e
01ef7e3bc8c77f1f5b573cd683f569a40ba70125 01ef7e83f555326bdff6273a9bf5de9e8b760be6 01ef7e87e58c10a4c8c8d4f05c6184aae35623ea 01ef7ec17246fa9584afcb67cc2162328b985d9e