From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 05 1b
41051b502d273ce088129ac9e130b81d8ee854b4 41051b961ed946378829100a3cf5b0818afef485 41051b9890d4c83a19cbb3474dd1a5d947fcb9c9 41051bcd05da8bb7ac67aeb437775bf014d7df8c