From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 48
0188482dd2bc20a16139fed28398e32d59f493f9 01884853eeb7439b02d04e2b09afe4fadc65ea2f 018848e15a1411f265b50c67b4b5d438cd131ee6 018848ea3227bd9e43e2b3927abfcd0380c8fdcb 018848f44068269c098eb5400a485fa92a66307d