From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 8f
01ef8f0a8c50b7bbfed0cc3181697f0d112f3bda 01ef8f71f3a3c53d20fda990b2be7138cbf611af 01ef8f7bb8f09f65eff07dfc309ae13639d3ddd2