From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 62 c6 14
62c6140f327091ba8ed0276b5cc0e91ed70705bd 62c61468034904a4b6d6a2fd3cbad55468dab523 62c614a10ea7bc20ffc7e86a556d62fa0ac5cb98