From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 5b 3f 5a
5b3f5a1f3d83a1ae4e435bf42138c2bc42f73ed0 5b3f5a3f60a3b284c826622c072da1d390d862b6 5b3f5afdd599b380971ce0206cf143d42a9df135