From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse ac 4d 9d
ac4d9d405c3a6ddeccc0549e844af2f77c6357c1 ac4d9d73889e513ac04e39aba5e5d2f52ddf00f2 ac4d9d856e93a84f8849f792de6039f0a605f3ec ac4d9df5ebee30b896daf93a85ba29146cff991d