From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 19 d6
9019d6833d8fd0f6177149d5a3c7e0503b628b22 9019d69f07500bac8cbe7f22266ea24840dad500 9019d6b0edd6e634c2a374bb98b79744220f0f9a