From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 77 b1
1977b1125a9e2add6ca4efe1e2d60d5307ddd62f 1977b1735be86b8a8ae68f8d03732e02856b7215 1977b1b15eeb3d4a42ed39a41d79c8f648baf36f 1977b1d3b1b462a15122b00871371036d6b1ccf0 1977b1e2079547609d5db68453943fa2efa9da37