From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 64 5f
90645f071cc19309847e4e7fe6ccbb98d209194d 90645f0fa2c802ec6437e95abaa80db60da56bcf 90645f8e5d6556e0d90a4d7de91f2c953e4a4af6 90645fb8b37fa5bf4e4b4421bdb3653b61823289 90645fe1326836ae240ee7beee412c3c9e364f2e