From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 22
38d32210c4b88057cd8406c5b0c3a58effa14c17 38d322a44e62e72a459b2e31774372d0ff1a337d 38d322a47b0447a9aad735d998c236da6d181c09