From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 88 d7
0188d79847603e25450946bdf122f6242747890f 0188d7d11363058c10fc4b3ed809f85cae9cd1e3 0188d7fd7ef9a1703c6ad3d3f81fd985e6d984e0