From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 03 46
4103466325c97547f59906d2a4db3f85bba76b5a 4103467b096cec7057731873f53aa41489eed33b 410346ccdec1b3e9d24e7d5b7169b8c475f9b8fc 410346df010983fbd08457869833782ddfc886f3