From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 c2 1d
38c21d0bc35ed8d09d2dc8764fe6f3ee873c2bbb 38c21d22adf51db7547fc2ede72069943510ee2f 38c21da33ecf4e3fbc58b96ca3c61c783c59d3f5 38c21ded1b6f141c5ff2e641bee5879258fcb18b