From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 03 04
41030422083fd73b72260f7967b0aa566163299d 4103042bf3ce1f3c821fd89f044876b119c8c097 41030477054ac9aa38678892a96f5a7a6e998b72 410304817054d12a6f102d7dfb12c699b9fde121 4103049f4efa039126e50b1caa47bbe313f0bd4a 410304d96f958cf1adcccf6649c088c367779b16