From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 4e 09
904e09b55431190803906535aacc0d830afa448b 904e09b8a7812bac98a2eb52be61d737276ee5fb 904e09d026abd3f22fb6f0468c0b4f13f850ea02 904e09e3cc1ee9c8917d69696db7d1e4ca373afc 904e09ec3624b22ec421ba1395c3ff477b7fb0a5