From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 50 c1 04
50c1040e656939909c1b8e66d679349d41a8d8da 50c1043e817f2280396bf1b18303cdf26c8f75e3 50c10490d212549723f069156476d23a6077fbc2 50c104dc9e6ee46ca6b58f1137789fa220dce086