From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 c2 6f
38c26f15c7d1486f6523b5294f54544e4debae67 38c26f29ff43082db92c5c193e436678e79ce51c 38c26ff17b561ac32f7d4f1d43c44568a02dfd6b