From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 03 b1
9003b174d49d7fbd59e22d182c2d1a1576d520ce 9003b180c4a2f377760dee16356bfbda18a8b61a 9003b1b1643c66f8e0bb5f56dee1a2171db6965c 9003b1f0e794b53eeaf0027bf63f020b5e2816c1