From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 23 d7 ec
23d7ec1fbe9362a5f051b384cc512f2c73b04408 23d7ec6c4af287f10da78093e1ebbe9e81867f4d 23d7ecb7c473f1c121508fff14819d9fd7f59cd4 23d7ece8990308f41fdc3bd1a8266a217e16f865