From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 c2 ae
38c2ae276bb834f19845b95862e7dd718e7799f9 38c2ae4313cd8c6fecf8fe7ba5cda20808fc1447 38c2ae45245a437e32a34c5f5d04032b8b9810a6 38c2aec2df46b9849d4a2d55a5f1d3966ac9ccc6 38c2aee39d035de52e51736d0cca0f13e49649c3