From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 ac 79
04ac7908e2de124d3fd0bc5dfafcf3ddcbc6f428 04ac79315e859a97c6cde96b32f2feb973420d7e 04ac793ba2f583c40983f158bfe34d3e8da449d5 04ac798315958891179acd55a6c1068f129dd8de 04ac79c3c0428bcde1f6acd795d68b4701c37a61 04ac79e584e7436b2e3c7f3946b17c437ea55ddb