From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 1b 31
381b310aeb4dfca78b06009bc4baf4c87293795a 381b313a7891cf438cd64daa884302a33c8ef495 381b315ea7c8d3248a44d88405a81a2e67646cd4 381b3192643071ea2333a6bddeab90edbdd97b09 381b31d2297aad583ddd712d54d1bc6d0bfd1ed8