From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 11 c1
9011c110e6a7ee9f1c7bce0d75ed8a159b130035 9011c1ae39a4169fe3323a51032e5aa0845bba3b 9011c1ecac885014eee1cb3a6c8438ea37d4b4d9