From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 77 84
19778413c76fbc2a91d803799421526c8578c250 197784452880624b07f75e985df7aaf905f29882 19778486862020115db5fcf04e44558ddf1e0891 197784ef3d37062d24c622b2e6738a242c2e54cd