From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 52 f9
fb52f93a4f2b7422b54688c7aa10c79b67c0ff91 fb52f93ce29fc8f2fdf8723230ee69b7d08d4968 fb52f968fd73b865359b2750b90fbbcf85e4e7a1 fb52f9e053e7d64fa357501f488b4dd3c5ad2761