From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 8a d1
388ad119adb6a7011b02fe72d178fe5d22117c0b 388ad1b1e9a803af86fe35cc704115cb97626885 388ad1e8abeaf56d53ad9aec3ee657dc6db5fe55