From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 12 d1
4112d16b73b3af5c8333b01e47691036d32989e6 4112d17ceb3a2f7d80a687cb00ff61fb97fde83d 4112d1885c0e1b113669b2de4df26e159f82d8cc 4112d191c6db01163ed797901f0d7c98216ee9a7 4112d1ab4573b6f9efa9dce37c89ee0f1f19f9b9 4112d1b495bec85956950e8bfa61858a9421e5dd