From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d 9d
680d9d545913e8af5ad1f94ef870057202eb8c59 680d9d85e96d679e0708ba39d0c9e962253c72ac 680d9d9ed494b602439dbf4335d169dc34add3b0 680d9da48df158f32ef959e038f1b219392ddf9c 680d9dc921b18c4ca8c60ad4e62b6f5f388972a3 680d9dccebe1f063c25514d5935a086308e748a6