From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 05 69
41056926a509072055cd17a762dc206dafeb5215 41056995e51ee14427b8222a61bc6f7fc8524753 410569f2d841b62c4d6c8ab661be721153dc1566