From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 50 5f
38505f2afb9b638c6dc25a887d71f94ce9642d53 38505fabee2e3c3e6a52134e500e9bf3341576e8 38505facb594a90b5cc3f3f90f1c5569cf9bb077 38505fc51914b401a0c288ecf60393235cd936c7 38505fe1bbacc5b6203c62aa48e97c003565cf37 38505fec2b56c49c70bfca7521a4f1ce777f6cb3