From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 04 54
4104540e7fe38420a7d06c630a826bdd6d0cf242 4104548322f14a55b98ea5dfa7688c9698136277 410454ab005c098e79e0c8fbced01bd84c95e8e7 410454aedc4d9346cc6bda304e8db717088f356e