From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 14 49
41144907471af4d73ecc2b5507e6d5d881f5c910 411449135a0440c508f876f882d6ce9d444781b1 4114492e48e5b4a8c4c8f63d73b63460a23e7064 4114497a715c6862dc159222dd7db9dc51cfde25