From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 7e 2a
417e2a05599ce20368f5b73709a81949cb52469f 417e2aa8d74be0e5eb3be374aeca508e568997d6 417e2aac195d619273c53a58d69ade83fc78f7e7 417e2afddb22bd1e3eecaad838abf5d7f03c33ae