From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 34
38d33430b08d32d11cf4da32d3d42ec1c3b6c113 38d33441a2dc877489a85ab79650e29cebd43e15 38d33468d3073ed1d7ac11f2fca2c51710ce2a65 38d334d1966399c3b666c52c5dbe5542d1921aae