From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 28 43 be
2843be1545d3e2b097dada8f1b8f9ffc9d4336c7 2843be1775ef09251600f90878d416a19d48430e 2843be379ae8ff9cd24646a4502e920ec78f6722 2843befe8fb918358e779b33e90e1b23df36d3b7