From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse f5 38 da
f538da0f160fe2bfe3d68d442b17c809b5de3ef4 f538da1e25ff1d4c59f5bcee9bfaafd785793a07 f538da6ff70ecc90620d57970fed1fc739d81b1f f538dad2e1957b910deb53081745a89faacde0b0 f538dad6babe69c04ab2c1031b27f3332e2c8281