From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 50 c1 37
50c13735f394a6bb5fc058e1eec9e07eb490ec43 50c1377cc6972defca5188e17a7981f76adc86fd 50c137cf3a82af4c61b293aae9b1822efe3e9306 50c137de97625455f03f4d9bd18f48c5dd58bdad