From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 df
38d3df16a5938212166f41d72016d10193cf52cc 38d3df8c6d4f26d0c4696c096dd7b879ff6a59ce 38d3dfa3bdc257ed6d483b850106ce170c2aa0de