From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 07 75
410775380b11746fe5c2746395d38d30103f1550 4107759cae470a76b2ff68b2cc91c494448e69c4 410775dcd4f0d82affbfdba8b3337ed542a2374e