From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 10 a1 b2
10a1b24b13c0ee0723f9497dbdc7176f3fcf6bd5 10a1b2678540bf8d135da544e1b34ac9dc5c1877 10a1b27813ce9737318660c51bdad1ed2d50f011 10a1b28b08335126f1749dcb70f7c01a84733f73