From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef f3
01eff301a9ad1b01181d5b968961dc3633bfa361 01eff3a0dedcb9ba165f8b3c805909c7d6ecf2dc 01eff3dcae1f7f8e21aaccfe07fb77c212031234 01eff3f3bdc35fc0a5430b91e2a2f028f78cdaf9