From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 1b 23
381b23070b6177574703efcf46bfc2f9c1423ff6 381b23666b09a0b68c6a2ffd4c8118e09b4db849 381b23ac5b9186be8156fe748025990381b3188f 381b23b8b5841300bfc55e4ee0adfa5a4b91faf2 381b23dd98a4dd3c6ed2d81aa9752baa51fa437c