From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 c2 80
38c280638e72dc579d7379b0f9e447d232287e22 38c2808442fe1e67cea566392ea3ee73304f7dd3 38c280a21a3302accaf572fec74fcd5e0ad01020 38c280a9b497b6e11d3143a3680b63cfcd6e24e4 38c280bb261a87e8d90836cc58c841655000ecd5