From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 10 7f d8
107fd852dcb82f84cad2886e5ecadbc21eadbbd5 107fd870c423f62bad4abd30b76e09a25f00d14d 107fd88219722147c4f734ded7c734c94ca61ee3 107fd88666c2f28b1b35a7b4e3e776e46c42abcf 107fd89e2e0e37924819affe8d4af760b541ec53 107fd8d21cddf981f767f3f949e800200cda8ce7 107fd8e1d62f57e2ab1b7dcc280cecbee7a46df6