From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 10 7f 5e
107f5e392fb59c3da7647398a5769d0c80b86ac9 107f5e397403fcdb5c50123a06ec4a0086ea677f 107f5ead2a2bae04810e3d8f5ee26529f6ad30e9