From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 c8
0188c84652b907ea6cfc496a04019161538e33aa 0188c8b67b26ec52987545afb3b0c9bebb9857a6 0188c8c06d8707a3c7c1e596a083906da12b5a30 0188c8d06ed0b3fb425647b82c17bd0561c38dfb