From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 19 93
90199306064c887fc2639a3204e9173b6eb80804 9019932f2e276e51e214026102f845b2d23dbbcb 90199334ca308e1f8d72c02a305c19c62e6236b0 9019938d5d4cfe5ece37dd8e3b12032926305668