From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 ca 40
90ca40408cc8af76004fc09441b142a6b69dbd4e 90ca404824ce3f69f1941b4ccb2b130bf337982e 90ca40cc7c9c6a62a7044c55cc246937d79316df 90ca40e0dfbf725644f092573ee8d09f1e54d22a