From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 50 f4
3850f4425a005c62370a12956aee415c1528594c 3850f4b05aad152869ba13a1aba1680357f7fc40 3850f4effa22b93d3d448a7e88f0820e3f796bff 3850f4ffed20f82481226084ceaca878ab76c7ba