From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 8f 01 e2
8f01e2322ad1d72ab549322216166d82a9295bcd 8f01e262df7eee79db980e6e8b1050dd6dc96c6b 8f01e2647cc6d5a3ec0d7fa36ffa5a97286f1b4d 8f01e265c65d2336d9742e84d9e7ae4c280a52c1 8f01e2be4dcde3143c4485ec3c4c07bd745b5677 8f01e2cb34e28d027abd56363fb5a9e40096b05d