From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 5b 3f 60
5b3f6034c084586d95cd0b65a751e954d5bce67e 5b3f60a576d21957035eef315ba3e630e12d1b3a 5b3f60bc74c1632b6dceb8b4db80435802437106 5b3f60e94fca6dab742d6581c51a69a3b1bdaefb