From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 03 34
410334a6ea371e7779e8480f954ba9b4587f6942 410334b1ad2f5f44561dfbd11191922db8fe0a70 410334bffd13e5ed90579fd198ffc918639c9465 410334c59ccab10230c71c330d51af4f067e5594