From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 50 0b
38500b2ad4926eefba8826f7d728306b4c82d7ed 38500b792c4bbd9a3f706157a463a47dc95b5873 38500bf94f6b7dcb01a6f6521ddfd55a51d4a995