From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 45
38d3451abb3292f5d1d05a7090e288fd4768f0f9 38d345a6b23792f636413e4460a7426dd80c60e0 38d345fb14c7991699b48c14b81e1e350977ab5c 38d345fc6228864c1fa5a1ce33569fe1258ee96e