From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 50 e4
fb50e422738cc8aecd716ed2085d5c5e292a78c0 fb50e4349d4b327251534834adff234ad8b1996f fb50e45ceb6453eb3716a44bb2232f29edaf1302 fb50e4e06876f3c859b7b29752a1744cfc9cbba0