From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 03 3b
90033b80da967a13d8b2994cee4b1d26d736e7de 90033bdde743f351a854152d71811daa9ddd5dbe 90033be623f4341914f3fbe38d5468a2b835b506