From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 1a e7
fb1ae72668a70baa74b593df04dae9a09cd99a2a fb1ae7639b4f60f8b7ace10e0edc57027b0f6f10 fb1ae79ffd45091d89070f2c2cd1cb8a9f96afb2 fb1ae7efb6066baf30600a081cdddbaf90a543d2 fb1ae7f53596848fd83e635c0b360e107759e063