From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 1a 6d
fb1a6dc22f0bc0327aba3f95227773acc412c45a fb1a6de04d7ca7b9718343d35346de8e8ee49f24