From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 50 df
3850df78db9787e02fcf86533358fdf59e7f917c 3850dfbb0ed24f415b74a016944ad6c44ed0c66b 3850dfd65909b06a7f790d82c2b4efca8e3776cc 3850dfec1eff64df4142759d9056c4b497e988e3