From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 1f
01881f0aa5a995ec5180e598e35df55d778531b2 01881f52a41b7aa281d0582c55d7b46b98a9574b 01881f55cabae374faf28e074b0b0d5923063c21