From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 73
0188730ed2b363dccc66543055cf5dd89eba36ae 0188736a3e6e0b500261720a3cfc44ea3c1b7380 0188737ab6cc62bd1bb24374dc989f0ba30daf48 018873c7f0a2a991fcb71a3026b0a1e03e12f91d 018873f35ba7fc25fb33cc8e1342961ddcd943a5