From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 8a b4
388ab445fa6161a3ab37491c38691c8c6f27cc90 388ab4e345b7851442b9a5d76a310e1ebf8acad1 388ab4fa61118ae5f53a0563dc37896cb81194c2 388ab4fba1e8eaed8d2037eb08d39ea50da7768e