From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse ac 4d 09
ac4d09367732705a377ebfc62369bce3d33351a5 ac4d09eaa71c09b708ba8b7ea9d9c415ae5b3c3f ac4d09ed20c62834806b5f6d596e9b9f012fd971