From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 30 3a
90303a9963c47ec08fe066aa14e66c85de127bef 90303a9e3af87d90d23435f48ae3482e939dcab1 90303aefe8f5fc5afd5f8c808a249b53d7290439