From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 77 5c
19775c0ec1eedb587ab3279f8974a62cc63cc268 19775c51cc5dcbcb3c01621d69828a68f1497811 19775c7f992a9669366ed6004fc91ca685dac5e6 19775ca28125fb012d4af1089b212db8c0ace09a 19775cc67e9d8f5a910231e551a0e31517aff5dd