From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 a2 ae
90a2ae5676589fe3e9572c7edfcadfe6c342af8f 90a2ae97beda358e5d0ea29a51ecad8af2441725 90a2aec06f0c01f7d3b4dfa3c027021f2e1ecf0a 90a2aef94f58813944cf24e2d1197df352504228