From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 1a ed
fb1aed53b419a77050be1f14e10b3e4e78d55a28 fb1aed60ce61b4725586420610692783336c560a fb1aed6151d39b68e03f16df9d81b021431c9c51 fb1aed995e63710d6de11b7313a3e8dd78b3ddd2