From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 7a 85
417a8523ca820f0f703e73164964a4d65d36f4a6 417a8547cb4dd6bfb2c7b145e1f82b3c35bbd64b 417a85a3edc6835ae2baa574a1c8945cf004c762 417a85ad055117965366a51e268e67859559399b 417a85adbc191442fd32a5cca729f7a36a9dd41b 417a85bf3cbcb8b111d4c77ae336b921de154371