From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 03 5c
41035c40ff9852ffa4c4d6be3b1402b2ca475701 41035c4f7c9bae0ce4fffd9d5c9c5de6356d8a30 41035c6fdcd8b611bcc24f389b27471c0a19fe79 41035c888a59527c1c97beda699de8468620c2e7 41035c99571a462b61b168772c08240b0aebbeb6