From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse db c2 0c
dbc20c8d1554b2b465d7e1a1fced04d24725708b dbc20ca755ca46e58bca7cda0ef5f4cd2f329f5a