From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 10 b5 33
10b533137f2b36a813482108be27a34a1f727988 10b53346dd8da2153d57ff91f7024819b315c366 10b53381a41b63dd06d3210e36c8d84f0e2c82c1