From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse ac 8a 28
ac8a286b89001ac42d52e4c01d38b229e4090252 ac8a286dc5726b1f428508f7bdab275f66ccaf0f ac8a28db69d0595383adaed728e6cf506f9f51b7