From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 b1 cf
90b1cf03fc07cd39d15a09f92703c7059f7082b9 90b1cf52caa71908eda1220b46ca7f1996549c2f 90b1cfb9c4a1acb0e2e7b2046f68868d609cc579