From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 0a d2
fb0ad20721380c10fcbf367cfec4f65bbac08997 fb0ad23354f429d795c86c4bf2bc2a6767af295e fb0ad23c0d36e6fe526f48a4d55e0c9434c83423 fb0ad25d466bf3394b4237e9aff4ec6774150d00 fb0ad2a328101f5d5044008fbc83afae691d5069