From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 5b aa
03 06 0a 0f 10 15 16 1a 1f 27 2a 34 36 37 38 3a 3c 3d 44 46 47 48 49 4c 53 57 5d 5e 62 67 73 74 76 7f 80 81 83 87 8c 8e 8f 9a 9c 9e 9f a2 a3 a4 a6 a7 ab ac ae b2 b4 b5 b6 b7 ba c2 ca ce d0 d3 d5 db e4 e5 e6 ed f0 f1 f5 fb fd fe