From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 10 38 a1
1038a12f3f73ed23accc7610c0fa9ce95ad80fcd 1038a15ebb34c8719db1164207fa154939d8bc6a 1038a19dceb8a5f08903ee089b0064ca34615d4a 1038a1be85f0771f660665682b1c0e82380cee13