From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 8a 20
388a201a0a58bee8964ce9ed1fb1afeef5b6375d 388a205a56efcd10093d55523357c561cf4190d4 388a20c093141f8cff9fbbd2d22cad3bef83c032 388a20c171e84221d3af2e2f837a0b1e916b9b24