From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 30 d0
9030d035fd5a56b805e386f6aa558e3dce568eea 9030d053b5700b872458af2582212e3d34e19b89 9030d0963c750cfd8ceabf6ca0d39d84a71432b1 9030d0c3920220b82683bd185ae35ac5c9b959bc