From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 5b 3f e3
5b3fe35b8edbf060a47e008df962e6660aaa7bf3 5b3fe3b64db28786d124d72c1dee6bbae7c5f07d 5b3fe3da71fc0b4a7c83a0baab920a534dd5bf46 5b3fe3f49a23dd19919d3c82e8c069cb9ec5fe0b