From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 05 f4
4105f4836bbb9dc6e811c4147e4b762be96fbb17 4105f4a683c2c47c8724ceaaee4f196573ae2ab1 4105f4cab1415e676f7c8ebe3af69900d4b034da 4105f4d1d3f560cc2815845e9703a5a9ad20671f