From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 10 b5 1c
10b51c4463f8714afae73ce1bb8d9d264be047e4 10b51c7925a35fe225545daf60e24129da4d9110 10b51cb012941d57f6f4e1a2bda71592275473fb 10b51cc7f6e972618e269fb1589c9d59043febf6