From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 82 e4
1982e465dea1cc00b9a8e81d9a569d8fdcfc112d 1982e4a438b1aebe34b1af91aad4cd0ccea2ac4b 1982e4e5153460aefee1ca6847dc723de4e4b8e2