From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 c2 0f
38c20f0cb4c99163457d2a295d9d455aa7d65a56 38c20f660c27bb54225d300c5495b927658d84cc 38c20fa81f9acbdb4b90716a0a3a60220ecdbbb6 38c20fd509cacb7221207229bd6d17def8c9028c