From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 2e c5
fb2ec542b887222332fd3dfde887c48daedebbcb fb2ec5475c3bff79b3837b92d10e0d11382fe92b fb2ec548af5c6c91991ae8b1cf16fa64f13cd25a fb2ec5dbdb2fc3b10d653b3382964294608f0eb3