From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 81 c0 24
81c02473fe21b987684e951c8faada54d3f0d803 81c024a62dc5caf43a260cfd17e69271a9024123 81c024f6f4e0d4c91c5320fb23762e66f362ec39