From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse ac 8c 29
ac8c2915e8d1fe63f8e9ce14c2d2b7686c664686 ac8c29ba7d789dc6d001d74a82cce4196236af9d ac8c29cc52a30912ea588581770b1eab636733f1