From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 6c 83 e2
6c83e2131a59d2a12c985e637268e33f736ab24b 6c83e24d96ca3788fc1144ae2e8c871771a65db7 6c83e29dcaac79ac47a8cc9f8ac3ab581bb6b6d9 6c83e2cf73762d1f312dfb8a1c87da8e82816042 6c83e2f62ebc24a3fefb25ba4475778f3a320747