From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 03 61
90036140afce6d2151f187d0aca5b8144d08223b 900361584d07f92b0c814d27828efdf3bce4f83c 90036176c77742dd8719babc2856657d66e0d976 900361c3ae88c38237e6771be1fc0172d7aeac7f 900361d23c342da2ddfe2955b4623fae067b2be6 900361d461ca566764b1c6fd8c35be52ecb1fe4c 900361f0cc72cf1e23d8bd6f917d6aced38c46f8