From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 03 16
4103162a5753a1a3f8714be90cc7b75dff6d9bc9 4103163014bd185395d42d0ef84a3b2c70a20f1a 4103165be3ccf9de4cb0547dcc194cee3b8ccf32 4103169a27a9a1fdb0d052a01490c042ef50487f