From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef e4
01efe417038076adb6cbe10d8abe587a0fb0e18c 01efe46dad2b3eb385ff3af225f2e5ae0ad3ae26 01efe4ab4bde307f20c79d5da60e23a5941e9df2 01efe4f44181e51f78759e51dd13be6ecb546462