From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 82 4d
19824d0d489789af39dc3ba40e4616d6568168aa 19824d23e0c8fd926ab3a35d6c163e89b705f54b 19824d676d14f34ca5aff7bf6c434a01040b7940 19824da446e6331600b48eaccecb5f6c41ceba68