From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 21 5b 2e
215b2e1651a12d3a19fa56db593922b56a382e67 215b2e2a41df1c62c326c58c02a71ec1f8860a96 215b2e6c2206e03b808fda1d8fd2988ce97f9081