From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 6c 15 06
6c15063fe0786ac1281745ba103b8e625c9d1dde 6c1506782163bdc869ef735d57e7a9b26db9dd87 6c1506a5853a22d3b537b589655ee28d11a917f3 6c1506abd5a73ffa8a4811fe2ee52860da8210b2 6c1506fcd3c61cfe4b8be791147215fb638a275c