From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse f5 38 f6
f538f60503406b0ec15b8839b8fdb10e38662d04 f538f619f550fc1e760c7d3bd047766be48c1d89 f538f63fa6753e05b68a958c382cf22e5f90178c