From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 ac 4f
04ac4f0e81ea273ce97b790b7d37fa55f034fada 04ac4f2c122b122637f721c92c61932849947a36 04ac4f6795b077e7b6b6e383b093953067449a4f 04ac4f8a12737eeb35f39837c813c714d116dda2 04ac4fbab7bdd8cac20bee714b83a157ae973b3d 04ac4ffaeacfd1bf1b7105da317addf28e128d99