From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 06 03
41060331dba98fad7f31ab2bfa6eea0a107a43bc 41060348857bfe5a1ef9dee3127d2fc3b00480c3 410603ad7c4b0d8913005cb28c1c6b799708b5bb