From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 82 fd
1982fd022766740e422d5209216738ba7e9e0946 1982fd068f121b9464b051c27f5e07cb4e1b86f1 1982fd785ab51f5e19b436ac323d74c3a26f4dc5 1982fd8408e1fdcf1fd21b465f21cf649e7cdd22 1982fdaaadaded9f02480a2d47f6a530498f5781