From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 7a 2b
387a2b49ead18f64e7dd4d254405d0260cfd2616 387a2bd5cabc05a8f93e940fb4ac985c6fbe05cf 387a2bdc2fcb36bbac9762cefb8e4abe80635340 387a2be4b69f9a945bc3a8488bbd6b9f57d236d4