From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 b6
38d3b62dd8c5fbb7c8631af2bdeffc9caa6ef54e 38d3b680dc726bb72bea67364443917799b6f7b3 38d3b691fe85cce6e58bbf3684a03b36f019f530 38d3b6c017eb52b15f61c5ebb10f22969cde4fd1 38d3b6df5714d5109aa7d6c22cc16d9b1065fe6c 38d3b6fd041440b3bb657bff60b47ad336b1ea06