From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 68 9d a5
689da5146d1300a9ea37c33a649fe6c79f022096 689da56719cb1a6a5d1f434f3e3920dec208c890 689da5705f2ae8d9ba7787dcd4923819b2b42a1d 689da5a5b666d0d124f8632bd674f02de2a922fa