From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 04 e2
4104e276dd2fa99d041ca94b26f2b750b6b823ff 4104e2834df3522f34ac81fb2c6ec6018344a008 4104e284964ee6d5b1c59080f211a14656a948eb 4104e2cee103e21bf9437bdff9b1c6e67c07df95 4104e2da36e587d2323a13bd0394cd8228b06f5b