From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 64 00
90640026a8334bc4809dbf717cf97690a6f2e701 906400518642935d396df2e41b8d5bb5f5491951 906400c346b1b1ebc175aa7a0568ee6f755b7e67