From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 0d 3e
fb0d3e13e480de74c5dcc48adff474dbe274bb74 fb0d3e5f26f9b8c610495283ecfabf6ddbb71761 fb0d3ebb7f16ebd455ffb734c7ced4616980f9b8 fb0d3edbee0204c24e3cb4522438d78818cadb1f fb0d3edd3824e553f0bee7903c0ac32067939f6e fb0d3ee9ef2d5d3485eff4ec295d225cbd1afec0