From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 0d 97
fb0d970bbf04db502ebd47a6cf1d0281e677a4e6 fb0d970d159a599cc9979b32ffecc3f9dca6641a fb0d97b3c426b90b7af6c31a773967fcaf1d8e84 fb0d97e1134fcefe6497c17937103cfcbaa8645e