From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 05 b8
4105b801c7fd696246f2b95ea5328b718f0c992e 4105b8a5e2e2ba454132eaa80120e826877033cd 4105b8f30e0d77b4959024e27388bf063e9a6f96