From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 b1 b4
90b1b41b4bfd2213044081b3a27ea326a5539e1e 90b1b44755f86947b10c563cc518d69279f5d633 90b1b45afed43adafb7933974a218862c01c0bee 90b1b4dad4e3910eac820ecbf7bc43c9becfa353