From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 50 53
3850533bc8213e309d52e299085781b5ff5ed2d8 38505376f4f7a0dbce7ce0d8f859731a4c435055 385053b335532c1c7c3638eda26de48a204ac305 385053fd2a8921e78f5c03f35b820f839571ceef