From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 10 b5 e4
10b5e4ca409f21b992f1e9305364500c9005a629 10b5e4ecf5e5e36f81efb33f812b8110008fb356