From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 7b f5 48
7bf54822424505ac9837994f26982b6511ad51ef 7bf548490fbf566c7b38837ef39f0192c98af0b3 7bf54867b2150eb5e00d242fb94f92380160f55e 7bf54898e84f48242b193ab539e8fd4c2b9c570b