From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 28 b1 cd
28b1cd030dc2b7411bd15fa7c522f88b37d8fd0f 28b1cd0dd4e5f61e9bbcc322f4cc96b7af46a087 28b1cd0f78d5e927585064c7b55fdbb683c06de6 28b1cd8bdb0bcb964535fdd1317336fab87e3efc 28b1cd93822ee20717be7dc1404d09cff6b6f6b6 28b1cdaeb724c3dd053fae82c651baf36d5cd018 28b1cdb2924294603201182ffc58cd5925211cbc