From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 19 1e
fb191e0cd67f1adcefc2cee2c69ae89b2ec03a70 fb191ebf3673a541efbaeab52e9867d6e5aafc02 fb191ec623fa9f5f14ac48962fd67e6f4851ed38