From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 82 48
19824821e6c84ea4fb7088c14541a8cc8615cca9 1982483ae532b2abfd9b2e58bc4d3100f1203b0d 1982484ea548084869d7a2c37355ac9fc0dda94b 19824869ec3b6fe79d0cccbb21e4f6fd7e14d177 198248877adc65918a5a0d84913fa3bd34856a7b