From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 7a 88
387a883de195d690373db5aafce10b32f5346d51 387a8870e119e1746bde91bd4e3bdc020a31aa5c 387a888ca77e63c9de115a8edbbfa60fc07ae055 387a88b222652471e597ad617bded37d6e4af17e 387a88e6d0c4d870ad831f2a9674ac29ef5975fe