From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 1b 4a
381b4a1d78ddd7616f582eae9335f51215dd149b 381b4a674a32a58001b9b4b58d647f4f73d23e80 381b4a6c7badfb177ffa509978ccff8f45b9dd0b 381b4a6df2318bf3bbe61ecb6b96a010f67a3156 381b4aff0cf66270768c35ed1cb4dda5f911db45