From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 82 fa
1982fa2d498b61ee09d1b7323c0559ea68db34d8 1982fa638902b045e9545fd5c032ee6d8afd2822 1982fa8afbcd2eec1be9765a208ce139c4f1047f 1982fac67c09aa91a03a05328ea40e144076b57a