From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 03 3f
41033f2ab4cd39ddb90de8ffa50555106ff7ab17 41033f2ecf5e4a07d8fde15dafc0fd21ea05a5c7 41033fbc299a76e90afccbdba4c1cc40abaac550 41033fe66b3a306dfa0d5c6b8e7f1ed34de388b1