From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 1b 9c
381b9c8b96a82c22a1351850a125b7ee65732d99 381b9c916476d90588f4101bd1f417925425c902 381b9c972dd69074dd0885909afc6921b2f17971 381b9cd366be439d99ae4fac08b6c196da89821b 381b9cdbc8f21a069d53dd3c2952800cd514cbe1