From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 6c 1a
196c1a2013b6e66887d8dcf8c3832719329d0a2e 196c1a93972a93715f8b0ab8c5f5ed61d0896951 196c1aa959b4c6b2e30634fb3898d8ed4b4e3783 196c1ac5037bcb5bffbe9657c7c958e8640a9c02