From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 8a 1f
388a1f0d76f9bd467c900e9f013f72e3a60ccc73 388a1f8f346851c5f25e886097a6fa62a3a88f6a 388a1fcc127ae5b5c9757c8873665ec50a686002 388a1fd77ffa432ee1662bb4f0e3ffe83920430b 388a1feceb343b998f884f02151dcd39678164cb