From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse a7 31 b3
a731b360b1f3c92b0722d01c9be2020012a191f3 a731b3a9683abf52e5387bd59c284e005946ec71 a731b3c933b126644cf6ea5785a02b66ed689693 a731b3c99d8f0a207bfa7e3bc28359758bf14a42 a731b3f4343d1e1cafb32dcc023e47ae0f4924d5