From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 10 7f 39
107f39053ea8ff742361a9346537abeaf2b65f1a 107f3933c23e0749987935ede341e5228ab71760 107f39a4a48509c37dc3cdf0413a392be04ab8eb