From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 1b 97
381b9711ade80cc012cd216850255cd7e037514d 381b9729ff55cfc71b7f4e33e6d3c2314c14b3f0 381b97489edf1bf35cad5aa51bfed4015ad69232 381b977e2802956e0617d5a8c2a9d1d2631ffd8f 381b97e949ffaea0b24a7b68754577b60a2a510b