From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d 61
680d613b609c88c4aa99056e646535447c6df3d8 680d619696b7b422c9363606a02d5e7a6aee087d 680d6198edd6669d549423f89f7c07fe528f68ff 680d61e06da40d18b1107e9548d2b0772ad24cd7