From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 10 b5 b3
10b5b30ab930bac8b5dc33b194ea22fa729138cb 10b5b35b907c54efd744114facbe3d2f7c763e35 10b5b37b00348bdae50aabee1a33693be11b0e8b 10b5b37b427bfb5fec2cf9e59b076351abdb6f3c