From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb f0 e2
fbf0e2a8f2ebe23e5873a936b1c5a20954280383 fbf0e2eae48f14594637d6ea7e0f018d3c0609f6 fbf0e2f0e33e62a1af881b2e67e405a3704ab38b