From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d 56
680d56587140020216ff6fce5fed53ecefda0202 680d5685b96994e242494919855ff0d802a34f0f