From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 95
018895123efbb15f13e34c3fe9c29830b92f2fbb 01889532549a13ba231c0c5fb9ec204605cc7a85 0188958ac4b6f315cc7e3467e565b8a8d4840457 018895b64432c895b15274fc62d951ffec0b0aa3