From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 1c
01881c1aaca702e0dd8926354adb0e015bdcee16 01881c20d49d632d283bb8e9dbbe3d02dc97b7ec 01881c86e7b3eb89be0e94bc6cc82b1fbf1d2787