From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 0d dd
680ddd1aeeddc27117dde1dc1eb5617bc4ae4571 680ddd41617449068c27e8c1dd7f1fdba47304c9 680dddbe7d59b9d39f50e3b78b7e25321c26d8d7