From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 30 f4
9030f426508b9cdc33eb62f17d6173c63f6c1641 9030f45434d08fa690d1898742abf3d72325e40d 9030f480c2d940602b91bbc17b30e465e460e90e 9030f4cba55dffd315b9676225ac67cfd48151df