From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 7b f5 57
7bf5579180fe695c23c2a06ebd65e6a1c27e9bb9 7bf557dca1fd41beb1aaae0a712faad98acf4fdd 7bf557dfbfebc999c2df364f54db0c68f3420619