From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 28 98 1c
28981c34455156c69434db80d327356a36aa2f82 28981c67287e6eceaf55290d73ca452de0f2ee00 28981cb29a74a57e5c1a27665c0f5b90d136690a