From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 12 9d
41129d9e37bd216112438aadce9020e2011d15b8 41129da73e16cf97b55d81f2a1ef2d5419dd4aaa 41129ddb3379670e7279fe94cfeb3ab7a18e5b85 41129de76cbfa427f3a1c9b6525bc3d7748b0a43