From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 14 4c
41144c04a9bb11c995c2ffbe634d7e763f104406 41144c627e2e8fdddfb055c2ca3554fbf5f83b22 41144c6452dde8874aab0d94be856345f887fc67 41144c8d8467a2205334fe35ff46da559adaa73a 41144cd0835ab5595b2fca36227e35c62faec853