From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 1a 94
fb1a9429a2f6ded3116d218c6795002e31a1c933 fb1a94b0c645c624583a6056cb1110806c77fdd1 fb1a94b1f604acb968da4924b4219c5de4d1db5b fb1a94eaad5ca1db8d39a9cc9c387b0bbd3cdbb1