From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 04 ad
4104ad48b51a5872225b59d8f0b2e13a21d9ab6f 4104adac95ecca824f34a58306c649623c824a1d 4104adee02d114d52830732522599b936c8772a8 4104adf35029ed283e82f51401dbc2789eae4341