From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 80 9b a9
809ba942faae421679b353b5911cdc7630c19b98 809ba94b3d4fded9e0d0e7ea2a847210eb7fe6f8 809ba9728c8cafe80a458191a37c82712073180e