From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 48
38d34827d83f0d898d97fb9e8e8c5d4d4ed57770 38d348638c241be179921a4031ac484bacfda79e 38d3488cf4fbc8dd6ae2107a62d812152bea91c2