From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d 51
680d510b2bf725bb3ab5c6b37b5afe1ccef8cd2a 680d514158826ee424d64f645b408b959b94c573 680d5157871bd41bab6c490fa8fae2807823f1dd 680d5182003be03edae7029c647eda10c8fc5535 680d51d24451ad5e0792a2016eb6840a513a808b