From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef e2
01efe226f5076c60751422d6226c348b9d51bc05 01efe23a4e16efe0ce57dfc9909173e368c028e0 01efe2b3721435664a2bb67a30389d6a200e1fc0 01efe2ff3553dc88d2db81a662449defd9624082