From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 c6
0188c60e89b8b475a57e5e8e4ea2ef8c428b8953 0188c64156ca7a6d1d1e1bb86bc6aab54d678e81