From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 ca 46
90ca464e3cc4ecd5caf35860c5d3ec33fae32192 90ca46ae00bee87409b37b25dd82bd68e540af16 90ca46fe6f4ad1a9f9e70869618104c5ea8b8834