From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 1b 2b
901b2b030a4afc6727b1392427fdeb7f6d128d78 901b2b85023f834e118049c8861c64311d910ebe 901b2bc6100c5bba8bc445d82dca2c2d2851d284 901b2bf5034605794da1b7aabce3cffa7474c2f4