From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 7a d8
417ad8482ddef1d82f590b226eaf72678bc59852 417ad84eec47d82dbae286f14edafa45f4e98f15 417ad870a6b611a82113f78751519a04b0637cb5 417ad89607042b7c3c5ba39a3f35d302e0fbf46a 417ad8b977e6bf9188a245add2d9e4afd0649813 417ad8f0186161c41964c24b0372317d375c5f61