From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 64 93
9064933769fa7db33772f6fdb79809461a35efcc 9064933db204a5641e71332995d41c70121f3ed2 906493cf1750cd126ba3ab2672762680df204e6a