From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb f0 4c
fbf04c307c23cd15bcc5b61a8c0017b918ac0953 fbf04c770a79d14a4ae552fa92b93863198360a8 fbf04ca4edfb4c76988eabae1204b5af96e5b6a0 fbf04ca94d5b196523c8f6798f3b05deaa5bde38