From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 28 98 db
2898db60e345fbca7cd20f9a83aa20cc36c1d160 2898db648b541f13e0a987abae204b78c135fb5e 2898dbc508972e4e0a609c17d2f57829ab1b9c64 2898dbf0ae194c116c379dba5949e2c4bfcd5d0a