From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 03 f7
4103f785ab9af30fc024154f3bdf8e6ca9dfa384 4103f792c63188566c92b265f41f16483d8db6a5 4103f7f834cc3627a4c6531a87078e4db736e7b4