From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 17 02 c2
1702c249dcb2747264814aee197bb3aff2de3dd0 1702c27a1d0257c27dc43ca2de3631729643b38e 1702c2c4c25a7b597b8e597acbcc20b763525742 1702c2d9f9101f4f0f2c9c3a70f4f58652f628ee 1702c2e2c371cb4e5e5bc2b4993c13351118ae7b 1702c2e859ae3435f1a2cf7d8f59fe8f4453078a