From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 1b e8
381be84de71f3c53a7b55ab493d6fb93f2b8b6a7 381be8c68f65b06cdc14cfdc5144c4a0409940aa 381be8cc39e36e17016800bb68020ae2f0fd327b