From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 6a c2 00
6ac2003d72953c0a270d87bb0287625f3f2f2dec 6ac20047c729e5bf1638f95d8099b775040a10ef 6ac2008d1c29e3945cb67a5db32684fc39f30da7 6ac200deb8802a7404750097ed13b8132b40b7d1