From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 3d 28
fb3d2822679fa06926af0d1a44617f49fca6d7f4 fb3d283b9ecdd9682f8e99b31e2977e7f57439f2 fb3d285712ed666e4dc5ed879d4ea979edb06253 fb3d286f2128c4d1df42d85669a180484bd891cf fb3d2885b5693273478ca95c8f6a2d739d3f7b6d fb3d28edc88e4011b8d0bba07cd9b145ebbeb85d