From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 d0 a2
90d0a25c2aa619fe6abbccb7baf93a582406fa08 90d0a29113e7d1c33f5da18923bcc4a633f7a009 90d0a2924b07f20828b4308aee06a1bb6c49bdd9 90d0a2cbcf1825d7b69ed91044af011506b49ec0