From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 7a b6
387ab60ee5413472085f463b34c55e04ba909bd2 387ab673ebff7987698f04e39a5bba9fefcf9950 387ab6751fba4a3aa12ff330dd8b8177bdf4b095 387ab6bfdaa0c7301c896af1f7183b167d2c5650