From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 d0 60
90d06060f4d922aecb04626f5ae0c7bfef283e98 90d060a8b5dc40c6848f2ee6585abdc690897f7f 90d060db5b9ec1ad25d49e68c04f1cfa06acf66c