From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 46 be
fb46be0e3804269edefce2fd5d766c7e614e8844 fb46be7e1bcf1bad1b6792d43b34a823bbe1a0d6 fb46beb4f73a31db431e7b3fd63426850eea304b