From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 98
01ef981dfde61654327b4d0cca1d73d525cb3ab0 01ef9832cb2d15d0ddfbdd24b4fdbc176d05faac 01ef983ef1dc8646464bcbf5a58aab36832709e3 01ef984a6d44f88a4bf50845200ca1b4833eaeef 01ef98dc91d4738f0e35b14fda695073c9757780