From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 03 41
41034110ca1a7101afff7b3bd047f79f0b40e5de 4103412a3d2d82872f94f106bd8b390d30cf7086 4103415605f53ca66639bf3abc17adf33adfa7e8