From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d c3
680dc30491865824b73c7858b35a0a888fc76132 680dc33e0a380c3a1cffcc74deeeb47d134586f2 680dc36466f353e05c4d34c70065fc6f7d31fe2b 680dc3cc652ccedded006a60da643f46ba84429a 680dc3d9c26c3e47d30ecb911a36afd400de08a5