From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 05 16
410516236613a5650ceedccbd08536bc28ff54c6 41051630dd13ae33fdcd45f10c4a0dcae8247fe4 4105163ec6424ec6689550e2f37328ec4677818a 41051652e47c3796323201b8397f40a247616ddc 4105167fe56c6f6b37d23678ffbd6d6c49de9a9a