From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 6c 42
196c42217acb7ffc088a328bc588a5687f7aadfa 196c42b7f6d067e704c1d0ddc9d51a8b0a1cf214 196c42e3ecc5d6120a70ac87fc1a2ca23664e554