From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 8a 90
388a9083813a599d4b45c08170ba9ebafeca1e30 388a90ad9e24616572e033eee4c25b662e591820 388a90f50276839220a3599a88f9c20ad15e86b6