From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 12
38d3123bb190e4d8f150e4af032458412fc6c04e 38d31262b17944ce38c4f0bfdf91d9913afc50a2 38d312a0545ad938bf0d53d215faf064ac14b6fc 38d312d8780160e5a33f9b473dcec741f78da810