From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 1b d4
381bd4360b8d77424b0cf9fb4d75a61146297beb 381bd4399a37881f9b8738bbc540452bb696c80c 381bd46b0f4dd45575c7fb6d4907a8fe74c1ad38 381bd4ea9cbf63eb92f828cc10a0f574a8d9d8bc