From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 50 e9
3850e91162d5c3a701bbcf11a0d1c36cb5554c1e 3850e93b515dd9c664391e3bf0a02adf37565e6c 3850e959db02ada95f8fee358348c4e5cf31267f 3850e977fd2f8682692182ff071c21ce4087003e 3850e9b2e9ac27601b22576ec9e30b88ed2061c6