From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 29
38d329480e9ec8c7846e61fa768d2a3ab524b773 38d32977851a59cf9ddc618fa9519ab7f08691ac 38d3297b435724e528462c8855820cabcfc285da 38d329f602b2474f18eca9b0a15da5d313ffa867