From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 30 69
9030693d17da798818ab076a3da1d8b967ddc8e1 9030694ddffe1a287c53181f2cb34b60b228bcb3 9030695f4690a2c36de976f119827fa49d0931e9 903069c14058d06b4421cc150579337c6f409bb9