From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 d0
0188d01aa106b66649c1489baa9b9a39a64f1971 0188d08edf26dba9a92dbfa7c3c6fa78b8ecbe9e