From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 d3 f9
38d3f902d60b8da8a8ed6e070275dd30aade3e05 38d3f9cf4d85a691d4d394c3bc1b370a0939523e 38d3f9fcd36dd19e9d57c938b84a6240ba0f0152