From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 05 5f
41055f022a951c6904f5c4de486d6dde1d8312a3 41055f1a1ab84f8f4ab76b26d4d58e45b7528edf 41055f28ac112ce3ea3dec8aa09d235b1b39531a 41055f3a258154166178c2d981f9c140a77fe9d2 41055fe57d9843c7cf06497cde5be3415c3615ee