From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 20 d2
9020d244a57b5a32d47dafb4f89b3e47fd00fda8 9020d2c157b26bf671e131845d9492601afdfb81 9020d2ee8bb994ffb3120cc1611181f00bf9acb2