From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 b1 fe
90b1fe2d682f979e2dd89b20694395de0b23ca5f 90b1fe448de794e0535f3fac663a6b0d07033343 90b1fe79937c8a896c6d3f10c7931387cbf7725e 90b1fe9a96966dcda18a85bb05159c8a044fdef7