From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 53
38d353695f2862ab853c1a79dd3271d6b110740b 38d3538766250ae65efa9d9f1b121429f95fa7f3 38d353f71dc47da6264d132039f3931b6ae7b0a8