From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 18 f5 96
18f5961edcb2a58c6a9a12d2a2bd3428be4a1d9c 18f596a3f3986b5350d90cd94403a400785ea77e 18f596c9038cca27e8f4941aa24d31e451797b52 18f596ec63dfba19a1b8584712c537ef01325927