From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 31
01883120e85229556c1f85fee10125446278c753 01883199daf0b0f8171a95bffc00d8fe6cc913ee 018831cdb2adc39262f7c0483ffdd2de4721ca53 018831d0a87b133adfad6701a38cd1bb50b386cb