From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 38 c2 df
38c2df1f1e585fc8d094bdf61c518ff3dbdf2e86 38c2df6b33f2455c63ea7b96d3c15488907f06a4 38c2dfd9b3e24a6e2531aee490df1c97ab8b1fa8