From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 11 40
9011405b205451fbefc1e8dd0fe4fa82e0640978 90114073049c55c56fc1d17a3698ae9169afa9ce 901140feb09cb8f0a295cb24f81220ddc642ec3b