From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse db c2 35
dbc2350549fdc92b8d3bd19ed2f3f2aa27229461 dbc23512644d22416d533b59bad5250b0b03105e dbc2355c5f8da6dd1d18a4868f248cc915ddbac6 dbc235a33eba7f1245c0212508430251166e0399 dbc235b3e21684e6d776846ed8e5d39fa25fe316