From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 8d
38d38da44cccec2560242b60a7e9238d926ecb4e 38d38dc6cf10d3260d2f19206463be6e3e5f1646 38d38df0e15a8509b83e746c1587a92762d20bff 38d38df8a07d8e8fbf8bbdc9a1f844ba1a761ffd 38d38dfd98ff609e5b69b9bd3b9f398087b6ae29