From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef ef
01efef104b10aecf844b5f4ad51a50ce2f073dd0 01efef41887eda36acabbcd2110c1efe97dd09d7 01efefb570532234440d4e8fd0f618cdb6549949 01efefc55033d1935fe1e74df207a6c1b0c0d546 01efefd1375e8e9231421e36bc279c763c18594f 01efeffce8ff10485ff568d8778ed9d89bc6c281