From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 50 29
385029362448b1d6e4acd458fff24d8b7dd2288d 38502989e9cf7c488227d1d05af902ae3cc9d123 385029b5f71c592e1bace89f235666595b1c324a 385029b8f30dcd913fdf65588f6b5d2a29614c72