From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 77 71
197771478b0f2723302541f588d06e78d98ceadf 19777164a5acd0e11383286181c82ccdf5606aae 197771a3c10d629f8482b09bd172e62006570acd 197771a9fabdbfb1cbd3e54b7ba99402a22a52c6 197771ee0e3d8f156c5ef270a4036705ec02505f