From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 ca f8
90caf825e0f390c50165301e283b71826e824af4 90caf8afa7b89bafff977ba710bb2c7e4c1bf534 90caf8cd52efffa5b7f6ca2324e242b5b3cba257