From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb e6 e3
fbe6e30885dd5479edb05dc34bf2d89a2ea07918 fbe6e35afb5ea1a01b487da725b8e15cecdaf290 fbe6e37cb868905d87ed9d59c526d8347ae74641 fbe6e38e53310f868bb11f660b1cba3a64ff6983 fbe6e3c2fadb8ae16eb5ac6766292d22620537b5