From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 4e 0e
904e0e1f07aab0500d3f102fea337851abac0af6 904e0e40a72287cd0563f49ef04954adf4ce53a9 904e0ee0cb74a1ccca1657fb5559f3f63df02ba7 904e0ef3a316753238bab8a62ed9b433b42e365e