From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 c2 02
38c2023322a687ba5d0a67db8c8bff46c2cdcde8 38c202884177645b9728fbb5ad495b3687281d9f 38c202c4f924aa2ffa50896026a27a36bf384948 38c202d097fc20bbf3ccff0292ce524f72702f97