From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 28 e4 45
28e4450ad8dd6a75896d0a81b0d545d7171609c9 28e4451f76d611144746232084df3939eee2af23 28e445283e53e9d4a5505ac49cd8bc72b95071f2