From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 50 da
3850da5dd572250005fad4e26a6fb440a25c6675 3850da6952f9222d4b4ae82259956ce55b7d1b95 3850da9d32b02af2a1e46252de7f7919dae6d0c2 3850dad19b4f1b8161f42bd032f5e461db259bc5