From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 d0 7e
90d07e5c8abdfc0548e06ea9183ae040fe3bb5f8 90d07ef1d71ec5ad91e6016f1d7554791b5e86cb