From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 a2 35
90a2352b868a8d6e4e9584fbd730d8fb97120be3 90a235963863722f1294640f7acf8ad87976523b 90a235fa5129d6b7c69f4de1f3ebe824e3e94e6e