From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 1b 33
901b3308b1f823b42dd0b030ec81a902e9b9232f 901b3321ded99894f9d2c9b4964da6f2fc59ae99 901b334498baf76a13a46ef297124b7f8706166e 901b33fe72f9de7e46f675f29612069078418fa8