From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 11 f6
9011f613fb769bac89fc04d4e6fddbcfbc6dd5e4 9011f624333285665809df1810956382eadcc916 9011f687f0a551492e653ec92603151e5a406ac0