From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d b7
680db750970768785f75db16cfa4f5fbce161e7d 680db784b49955a31b98add48b5936782423f90a 680db7a2e15323971775addabfd9a50ba74a46e4 680db7d29bd2e8a1f0ffa418e054186eda5e5e47 680db7d90ac70f954381862eff7f3562f0306524