From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d 87
680d875c78626ff2a2ab096910356d24793a2d7d 680d87733fffe38e2c4e80f48886945183f8b9b0 680d87cf81c145d24867571c0f6adea44ef3a6e7