From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 6c 15 d0
6c15d0024b291d3cf1f89f84e6f0f5012367d2c2 6c15d0b1fcbf6e35870657cf4e537ea342421f3a