From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 5d
38d35d103b9b22e6418c43d12ea7cf10fe5c494b 38d35d4948027faf3cb275d76fd86a51f87d54d9 38d35de772e6099ae9f88b5d788b66cfcd630a37