From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 7a f9
387af95833c499ea35926b0cd49b5ea30710db99 387af96164c6f3af84ac80ec71342dbded76e1ab 387af9a161b0225232ae8ce828f4674b6211e348 387af9d16c28a06d4573ccf4ffb812236e288f3f