From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 07 a9
4107a910bbe62ecb07db19c274fdc55c8909e210 4107a9a5284f7485f28eb19f015df30c48a571da 4107a9bf5dc4b1948f369b3d4edcb7a8e99dcda4