From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 c2 42
38c242006bdeb5d969c0962326f996539d137b80 38c24229ee9756ead009541ca1063ef89294a7d0 38c24239ee50cd0735d49add69a4ca9ad6da0fe1 38c242c9c973d5e3566a106a9aabd98124f6be98