From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 1e f4
901ef4123e0b2a76cd1519495aadcce594ccd27a 901ef4cc414045aff37195075b0d4aaa68f7164b 901ef4fc6f2e28d3fd361ac4a74f15be82be304f