From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb e1 f5
fbe1f5047cbd88d2a109ece970874314c4f64793 fbe1f539df30d6e77c1faacf47f047e278cda9c7 fbe1f5420af6db9d9cab374194b219a14b03821c fbe1f5924ad35a72da7eb5dd336776b04cf1ffeb fbe1f5a7e079303004074b9b977a57cdaaa90c13 fbe1f5e106556a114c3d66610156d013b6142a63