From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 15
38d3152ba17be974e13110050e8616102b11ce11 38d3154d1d58af72f4c4e153fcb2a39a9cef32f8 38d315d25c513c1065960dc67a90a3dc759c4c40 38d315e7f7c1f29987c640d75949228af50670dc