From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 9d
01ef9d1b46391890ec4381ee730909146dca6db0 01ef9d1e531ce8831a4db78fe35e932da36d6986 01ef9d790602b86f618691f65e8da5741e6b34be 01ef9dcf0f4199732607ab996681e12a5bb4dcac