From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse db c2 5a
dbc25a1f2cc89ff8f8b9fc5e3f7a07ab181071b6 dbc25a6d205863ed5fddabf88e6d529b3221dafb dbc25a960f2e97d1b8664dd529d1adc8e7059603 dbc25a98488f9c8c1a82267f244d20343896353b