From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 21 5b 6b
215b6b5cdd8cd5942f4b1218052bdf143fb5e15c 215b6bb1731bf37d956cbc479d87449b7ac37944 215b6bc36f08a2d733db75b214d5f9b2c6e44bc6