From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 20 46
9020461ab4a2cca73cf86c9cc281c8a18facd50b 9020462564c8b4697e05c9339233e0f411b71275 9020462cdd5ebdd6f3bbcbd5f65faee1902ddca9 902046aa53cab2337b3190ad6cfe273a006527b8 902046f9c5a943ba6592643d18d84ed71a376d8f