From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 1b 57
381b571912223f1f8f1e4e389fc95a0989988e78 381b574fd69d779221226b18f1e0ea5dd3681bd1 381b57ea9404c9508464d4efd19c85ca3db31c30