From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 c2 87
38c28705c99e68677621e0dd92de9fbb15d33bcc 38c2875278e6e99a51aca34f31a338534e06675d 38c2878b95202cdb491320c79528a73c25d04f35 38c287ce0d2c41c61e63e1062eccbf46d52746d7