From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 03 b9
4103b9060739c49d2da7142d5c5e9d0d1a0a54ea 4103b974c396dc01b9abe47ba8f3e31e21a931e7 4103b9b785d87e6241a47642c2bdbb329dee76db