From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d 49
680d493121698f9ad8295398f40954d242ca6a9d 680d49530c6b8e47145440c04505a952274edc85 680d4975b2c8d468bf2e0647acf6e85764b3305e 680d49801f3d7228834abe983d423ab4d0c02ca9 680d49ac9381d4ef4d2be6a890e0d9f98b62878c 680d49afc2f0dd4b5c76f646ef401e1d27b63d17