From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 7b f5 6d
7bf56d51b73f3b547432b05e1f3637906ed551c8 7bf56d5da45023e73e9f011f7fc8ebc2d6c5fa8d 7bf56d7036870434ea5dcb0f90e75a0a6998bcf0 7bf56d7e264452085cd37a9b598c80162f7bcc20