From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 27
0188270eb24644d676011c1ec1f415e896e3099f 018827474376e81005271418cbaa1270623c90f4 0188279360cd365fd8cc46a88a21cebc90323977 018827b8db6053ebe0bfc70b6985231436dc6291