From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 1b 46
901b46107b8882799743c4800253fcfdd2eb30c0 901b4684d005e05b9af4d25f9a23113f536463a6 901b468acbc4aec94b3b9cc6f833addd234c63f4 901b46988990755debe73df5cae73b090bda3671