From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 50 a3
3850a32e676bae7d981c3e3c7fa091658424e7e1 3850a3ea0f05c3b2474d04a294b6ea076b247b4a 3850a3fd11a0bfcdf850504d1c4f4f4af9371e36