From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 27 b2
4127b22982a9adc0071a390e6838b4d4908d49e7 4127b2727b1501fbbdaf174c80a63a4d1f4a327f 4127b27e18df73de66f84f059ed8c5921e3452f1 4127b2a4a2d17ccab5d26fd60471c6ea73ac14b0 4127b2eb6151bc2a7a8bb886e06b7b267831933c