From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 ed
38d3ed54fa34ee89401ecff3f76fbe95917b49fc 38d3ed73f8a2e86b4765185833ec7c404cee03ab 38d3ede7e67a5c6584d73449157b0c1f1694db3f