From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 19 86
901986349ac20995f83aa36a511b4f5cd9efdd1c 901986391407e6acbbe7aa49bfcd45f9b7781c3f 9019865d7a712cec10dac1ecebbb88dfb359198d 901986f051d9de9fa74585b3190c51a5929dbd7d