From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d 9c
680d9c1613f679b06ed75169c474f08ae0d92c51 680d9c413a3956837e29c074977cd1543fc5e300 680d9caf8b0a414c33516d4cd0b32bb1e1e86fea