From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 1b df
381bdf22d2d2b68377426824b0a5a0111191753f 381bdf6c1486b0154a4674e3e2bd92e7aef3f368 381bdfc555efc7070c7e41c77a13ab3d96b8036f 381bdfcead2f5cf6a876e335569a421672231ef2