From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 d0 4b
90d04b42e77cb032200d107e29f7fc8afa124d22 90d04b670974fe84e6148d627b048893aef83d08 90d04b9dbc6e82bc02d1fbcb4343e65b5156c013 90d04bb53ef28ca29f8997ac86c4646b19a15cea 90d04bc2703f06cf6ac06bb0ae20f2f42e94f149 90d04bd445898021ddf232352f50efa6a0577940