From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 11 b5
9011b51b4183453adf3490e41b630b0fa110eaa9 9011b54a62e36cb197ffb6b4598486ed9b917f82 9011b55a106f3848a6e5c61961212d3077205d5a 9011b5c53fecc4aff82cdf331aa87a13e073c294