From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 50 c1 08
50c10820a5afa099f67c75e9c93f9ea9a901190b 50c10837acedeb75b1517be1fe09dfcfdfea9697 50c10874aab85b48d47408f5b9adb299762122ba 50c108a90809fc15164c930e36ef2276f38cb2c2 50c108e3aebdcb27fdfbbd2a96862c0804901dac