From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 80 9b 2f
809b2f1760ad9dad4fddcddc36fccb4222cdee82 809b2f6a626c7fcac45f3acbead778a06ca0b7d5 809b2f7ce8d3c41b72079925d2cc8c44f1b946af 809b2fe8340b7fb7e5e3380cc3c45129b6c4ece5 809b2ff745825435a81b6e7275b806584ff214db