From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 0d 18
fb0d183110bd12c10bd754b40c0b1d0f30f70f48 fb0d189f781d479a58bd739e4b63f23b650e8daa fb0d18f3e3f1bf569c2abc8988196146f2af0a62 fb0d18ffa81df3e92cd64f222ba33e6e95723d90