From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 1b
38d31b509dd57f7bab63dd030a2015456db0aafb 38d31b7885dd603a19852acd8ea0b44b845fe8ff 38d31b9d3f1369afdaf320f36d304063852a4d8a 38d31bc65eaa2d3c976e3748f56ab93ac0c1a5e9 38d31bfc0746f141494727ede733ce1c7fbf9500