From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 5d
01885d2268bf756d9c9a6f75c5c59b0b97dd1263 01885db7cf855bdf21debf29a0131b1e969ae455 01885dc4d4d3e7fa20f6cf71b3791e177f3d1a84