From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 1a 99
fb1a9924a19c6a3141668782960c8be14c24df98 fb1a999d7681b12904a53293c6df8b23b358b00f fb1a99ca8cd5272338dc7afa2568e9a61e786c31 fb1a99f900808da0d419cd5d459ed48cfc2db76e