From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 8a
01888a0d996b5413fbcda4893eaf18f1cda5effc 01888a2d6a8b96c80cc3f69863de1897372cf3ef 01888a79323f3c5f8256daa522cfd6cadd47a6d3 01888aab994ef7955a7d1b5685f7d366ef0258c6