From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 28 9c 30
289c3064092a3f9a4ca4a5622eaec02e550af4d6 289c30a193fedb404e7d1075d3e1e378a7b6efce 289c30e4610c2e75173ec246bd1a573b2b4ed426