From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 77 d6
1977d60ba405ca5a83f9389e2a5f2d33b6a58ea1 1977d615cc6c16f611dcffb21551cb41ce174152 1977d62ea02e7e549e5c7a1aa13093b27e910e94