From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 33 bc e8
33bce8c7d117d32e5f0d7abd8d7dd851a1dd468c 33bce8deeaed53e0bfb14ed0dd92cca62bfc3b61 33bce8f9238a1cf8e79abd584c74e3fb7dcbff0f