From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 da 6d
19da6d48e94d8b9f8f9cddf34a774dc3e1b8475c 19da6d4f7533989261c0af3a91fca59b6cacf22f 19da6d51d519c23ffc5cb7c5dcaa2290202e212d 19da6d60daca382f616a6c136e534aed8ba0810f