From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 06 15
41061545bc5b64754cdccbc619b8c0f2453f0ec7 4106156b57b8c9743d700de6226867ce17255be6 4106156ca7202a3b145dac86cd06c288808aea96 4106159e2c0e28b338e4014ce7de598c3d6ef7bb 410615c37d0b51455403c735c21e9b2b482af828 410615d5775ce68c7732566e614a912ea69300cb