From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 1b 81
381b8114397e672a80c9a97c88cd3b631f18d893 381b81926b476e05498d99bf57e23b2bd58b2768 381b81af97e68e8d09ccb2ff807f1c2e7f89c480 381b81b1e78f408a23bdf9952c155a48d0224306 381b81c33ea98eb03e1ec800dcbae00df5096eae