From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 8a cf
388acf01109bc06c02b96c47e60b12d27dc7e7f3 388acf172a1b1e56fdf8b405d4c1c7f4d426bf3c 388acf35da47dda281f098d7685e330c0859cd1f