From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 52
38d3523bc0819c67171d8d3cd7028c76b8951d08 38d3523d34a765a0f66cfd79326ec9e09046cb10 38d352a08f618dc909b04e1e96e8de3c353aad90 38d352ac4faf179d10f9a576713a37ae5a9b772f