From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d 53
680d53f9c1377b7b290fd2007c16e6160f08b20f 680d53fdf2ec6d99d4461e98e9ed3deae762c9e9 680d53fe4f1ab3c6bdea4a4fc33782e871b42eb2