From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 9f
01ef9f0fa26ddc6aa5d04585aefd6a057bbf24cd 01ef9f1ceb773ca73a472a010e597df023b2ed7b 01ef9f21d2f853774aadac07ffbd7cfbfc36f4d5