From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d 58
680d58435e457cc327f824b30ade551adf12b481 680d5880ce8e3ff265f5bda3305072d1dee30c0c 680d58bf828eb6d8374c0e1e877ab48888748c88