From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 0d 95
fb0d952f8a6d0ad7f17bf3f686454384d751daeb fb0d95ecdbd0ade84ea0fd151cbd56f6e5644376 fb0d95ff5a873afbb0cc7aecd80189dbcdd3cf4f