From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 c2 46
38c24622cc219f5d67f455e28084588e11aa2f74 38c24658e5382c8bfe9022bfc602eeb3d806d4ed 38c2465d22f4f7b2f589c488b6b73bec26ea68c1 38c24686bc42d30da2d5b91fce14a60fa83bb1e8 38c246eeaa9cbaff4586d7c1759f83d27c2f0c7f