From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d 09
680d093632f285db2222862ba5b20853482fcd60 680d09620e968094d1e589c74e0c9624ad103190 680d09c1de9bd63bacb8e93d1ae6e8ab04723f82 680d09e191845b4da53a9636fdec135444b6b869