From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 b8
0188b812f334a936fec11fc8c96ef031be4f11ee 0188b86179da34a736c41e250e9b90f4ced5e5a2 0188b8b20271b984e656f59bcc6374d36ceccd6a