From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 5b 3f 2d
5b3f2d1755fdffa3f5952b5fcd701d18ea92df45 5b3f2d24f798c59e8688766b1f194b14fbc72f0c 5b3f2d2f03d44f2e3543f1ac8d02f30d7ef837d4 5b3f2d8a9a558246e912d21d46e2c3ed88c32e09