From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 c2 7e
38c27e458ec698e863dcd8fe9a4d82573a985f63 38c27e6514bcab718d2a5f1e39e52197cc8b65a7 38c27e6fddcac5d7da3649810eef226181e6f6bb 38c27eb7f49dc41447f53e983a2f390b405ee26c 38c27edd60c61e8db0f84f35685959a399a26f6d