From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 ac 3b
04ac3b163bebec03d827d8e6f556d3cd0b8c32f0 04ac3b50845f8d84cc96fbccd232f404a3fcb8de 04ac3ba243c4e18ace77a66a53c790ac58136c3a