From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d 81
680d810b585cd1f82ed5f8001e1d5e1db3a3311b 680d818c8997a2315c1b8ebabed9b7b7eeab6e1a 680d819c6d62ed5df57294eb5248d1e0448a05c1 680d81b67eacfa5c84b9b16626cf63e762d2b0c6 680d81c5c3db4835abe39f6fbb42bfe2cadcdb23