From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 28 e4 90
28e490032c5a42fd0b9ef59474ed0e820bac0ab4 28e490bbd009459dca220e2af12663cd065c3a84 28e490c4f19c5256e0cb23d75b5f7999e083086e