From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 ca 9d
90ca9d748a1816c48fc5a4dc293c8eae92508498 90ca9dc0fe1fabf4ca20c828f6d5b64ad018514e 90ca9dc728b4ad92f1a59e536d4ccfe685a98069