From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse ac a9 a4
aca9a40c03ae912c4995710e60d53419c1cd9735 aca9a431018fd9511c8b48dd9030349ce8ff45cc aca9a47dd2c3ed936fd67e190d49d19760fe8882 aca9a4dab34fd664e9b199d5a04853b697648344