From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d 25
680d2527a4bfefb1395fc81e543d8093eb80e5b3 680d2573a64904234889b776e472b344caeec7b7 680d25c78a30c10e91087524819f91d9f6eae13c 680d25ec0764f432d9dcc9084ea516401ca74770