From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 6c 2b 73
6c2b731a90d3588d8182cebf9308acbee5c0ac55 6c2b73603f96f5ca6264b742dc1ad3348f217ace 6c2b73ebea3bb165c43f39864a02d64fe5cf0517 6c2b73fdaa97b0e07535b0d04d6fc6f7ca3b94d5