From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 d4 bc
90d4bc3f39c0f6645f5aa50f604290abad8811f3 90d4bc5a6d34dfaa939160b59d883fea51745947 90d4bcb3085565117a501fb319511b2ccd8e31ff 90d4bce19bbc62d4974ddfe652136cb405fb7b8b