From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 19
018819098d9b86a13c26d8ab0076595b7fac9f8a 0188190a95906130f3eb73f813df4d876a2e8777 018819aa3d74288458c97a0f6049a9e42b7b33f8 018819bf66b81310fd249f4e292d4a526d2f98ea