From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 21 5b 07
215b070d1da6ef79d72de0872ca7b4f9d022c66e 215b0724cc7245c7f8f4dbea1cef3421a0ba1495 215b07806819c077a7ff26c800b6200ee51af7d7 215b07c590338599180a5f0af416c53f54a482aa 215b07ecae60e4cebf8e945ec3db3c082dd2d087