From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 03 95
410395802bf69b95525cdd4dac6916f4f027021e 410395f8ee5f67e35cd2df1c8f3ee0eb771ddb8e