From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 0d 0f
fb0d0f1c4b1e6d1a734a394b584da16d9e4b8802 fb0d0f518391fcb27130b2a8235c3b125d06ae10 fb0d0f9393d19e8cec6f2eef3c17c1445a218efe fb0d0fea1c26d8b5e4a202404ac8090ff7187ddc fb0d0ffd21a329e3720197b42ba5705f13bf9752