From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 03 3e
41033e130bfa7cf74de115c76f873d4f0f588318 41033e1c8800a086ecd87d4084098896b17b3d6d 41033e74bed4202e84c96a48b1e0eed3f70764fb