From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 75
0188751efe26a8ae8da0d164d6588ccc9470a680 0188754fd20bd738ba377df3ad2b6a2b530a31d5 0188759f17f4bfe0a564e7ef7ff04ac0fb889e9f