From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse b4 c1 d2
b4c1d2575bb9c8aaef51799c29202aa00c185f02 b4c1d282e340579171617cab8fed74f4e1c28b42 b4c1d2fc2d4c500c9a69b9212abb32041445dc8b