From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 d1 b2
90d1b20b1cb5777e5ff63d8debbf332e107d1833 90d1b24426b7fe3ab5fcf2eaf640f59125dab6cf 90d1b2d5a410311a533095551911c6ead84e033c 90d1b2f5d66422b6cc9d2ddfa7159fde05af8214