From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 58
38d35825c93b333fbd4172c169f1f0a6d3717ee8 38d358544ebf7148061e9d3383c0a7ad34f5080d 38d358630587e7672d6fedb50cbb9a9b4d2ff1c8