From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse ac a9 27
aca9274604a389ce879006a039bcbd46e4da81ad aca9275b4405c97b08b55e595ac39a443b93d292 aca92793f3c46bd9b95e1b0fd47f9fe0d44a21c0 aca927a8db6bdf9acf77d5622ff554ab94ffd3fa