From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse a7 bc 06
a7bc0622471962f3c0a20f2d476a086d4b456877 a7bc063972bbe26d34fe3adca4dbd9a145b5e6a7 a7bc06a4bd96dc46a6e1b58c4c846a519b4be38e