From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 ac e3
04ace315d409496d7d11011db35cf95232c351b8 04ace33c2ffa2aba7ebb5e22484a4f8eb99d2b30 04ace358c23aed92b0d7e92128df1a589ff757ec 04ace3b69591efa97241a56d1aef1c0a5edbcb5b