From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 8a 18
388a180cf7ad179ef33f75be15cdb0407aefa062 388a182535b50f6fdb3876447ca30713de9da348 388a1844dbe34823aa55d2c927b7230575f5bfed 388a1889b6b46227d910fb15d54103fbb544019e 388a18a8e95193dd67265239f708d59d260acb57