From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 50 a0
3850a01a917985ebba22675305ba9332a6174d14 3850a040382cce1d2c0a2a02b7baf3e08a52a161 3850a0cfe4a27d3deedd697534758268c023f5f9