From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 ac 61
04ac610137366e8136530c07778b4894aab42b2f 04ac6158ac9d435252ae09d607111394ad5638a0 04ac616526f917dd8b710f3f2ec29bbaca07e71d 04ac61e08018a58ebf36cca4b35bd0097a4c72a5