From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 03 33
410333014ef680e302336a31ec27a259dc46d935 4103330f4c569439e07a3532567ea626834bf61a 4103334d8139dac51d460cad7238338b215f49a1 4103335777ecf2904e78b65231be1b632686a84f