From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d 64
680d6430556ff77b2f9a770b205a88d71a14a24d 680d6492041c609cc625e3942f0d02d563ca8899 680d64be04760b715a19d2c7ff759cc28d9a735c 680d64e6db2d18a89207daea1a96768949296567