From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 1b cc
381bcc3d59edecb476061e6f46a8fec7c44c8d84 381bcc41b5d60c85c1a55cd55b2fa5f78599a99e 381bcc624e31853514017dbbd86efb74fc217556 381bccb93df437529ee36e35b655e3a4e22d8bc8