From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef e8
01efe81dc572c2776f83ac9ff98e127f85e546a9 01efe822d24f4b1b41840242f41c8ddb4738990b 01efe849557c9d406b2c9315fe39182ec645ecea 01efe85d223ce631825898111bbd2ecbb5cd0739 01efe8bfbbd114b4619d403501e5f4938c0fa6a2