From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 6c 3b
196c3b75a04ceed714e8a86e05d2821162185a72 196c3b82ba525ad25e4e61c8855ace01b1d8669f 196c3ba32efa8ee002fcc6a9c1c6927c2ed9df54 196c3bd27f44327e51a0f1e7921f303a55f52b26