From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 25 cc
9025cc3fa47a1f0ea2774f124c3704affaa083c2 9025cc5f881c50f6321f09e1d1dd49c8f31c65ac 9025cc76027650766ae01c872d524afd9a60993b 9025ccd961a0fe18dd14b47b0a074f1dfdf085db 9025cce6f20dc2c47d19f78e81b6b9756a543320