From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 11 c8
9011c80405a59f9267153c28f79e7e95194b3eb3 9011c82ddc78dde2e9358a4505d9cfca32da39cf 9011c83ca68462033702866947d134e40f7bcc6c 9011c8e885af158326942b02b0400eabb832cf6f 9011c8e9d14d8b12fa5dbca8e6a2907fc5bfd9bb