From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 17 02 5b
17025b57d9a6bd7aa13fc0c4e47579237aa259d2 17025b7897ade8cd1c16f95a8a8734643e81ac7d 17025b934edc474ee41308e0da5ec99342d13a34