From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 6c 14
196c144f42d11778ac106871559004fb78db53a7 196c1488afb2437ccc4567d13111abd91fceccab 196c1493c4b5d00230af9ac6d9fb8f4900091ac7 196c14994d657273c31f7d74fa31c7c48c59e43f 196c14c74f4f0621c6d4100af4b3f99fed8b98ca 196c14e466ea4db5db4c17065deb4df30bb72cbe