From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 0a f0
fb0af061b27e775d6c3e6b7338d6f5275466870f fb0af0a88ff66215b669615d7aea5f72d0d9c700 fb0af0b4c2c4057cd24b253b5507171041a4bc68