From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 14 d1
4114d12a9609828fb5416097846f429a3e9b7a5d 4114d15b79f5d3bc8352da3f0f53369914a6bf4c 4114d15c0950d72591761facdca185668fe31e06 4114d199c1eaa10cd22b9597fe85bf6f80ea92b1 4114d1c9f179919d6367b662377ec87036fee1c0 4114d1eb2c29680b2625e79e1326d219a9749335 4114d1f3f7e5cad23cdcbea77df5aae89562b19f