From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 11 db
9011db23d165a0ad7f3d4c0d11efce868059b5e6 9011db4b3ad0cc63b7eb161246b8417b77b48c9c 9011dbee17ff6f0dfb1f768ee5f807c09c14b5ed