From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 38
01ef38550eb0cad84690463534327291ed1bc777 01ef388c4eda0dc4e27fe901c3b08b4ee3936345 01ef38aa7e1b702528d09a8fbe52d10b06d38ebb 01ef38d9d07719caa7e7f5ec619949245e7e7952 01ef38fb734e50da5b919f9b79bb76716ee562a2