From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 7e 35
417e35417676d1fab13c417a2140e88c3ca78cc5 417e3558e20c73f7161315f7feae3d2056683383