From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 4e bf
904ebf4c1478424e914360647b2879e2e5ebb6da 904ebf5980966844884ec6c37b98675f939ba4e4 904ebf5b630e240dee796c9e8f2f93beac3240cf 904ebff986e4f5568a9ffbb732cd9ccf010c5a8a