From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef d1
01efd11952f9bba2ca2e80adfd18b44f3ed4c62f 01efd158ecaad4ea53afe7fc6b1f36f4430e1d55 01efd1637a9e3982f765949e05abc8b18b2a8408