From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 c3
0188c3002a22f31d403896efc1a9634e7bfd0a47 0188c31221199150cf6361bec8ce5c538a13c696 0188c39d491eb7b9c93bc2d6a3f4214a55382068 0188c3ac9d1e10f22c84d80c1e32435f2a688871 0188c3fc376a253811584f8584a3a8e085469652