From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 6c 76
196c763ec4d62bbb46dba2af70a03ccf535a1ccb 196c7656b56a19c30267678677abfab8e31d92c9 196c769db35cfcf1894c977d230625c842ab5c5b 196c76a82163deb73662b972d9ec6550b964901b 196c76aeb027cd3c983868d654ed3dac2d0a9ac8 196c76fdeb1b91730f72711c28b8799b7bfea765