From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 7e 8b
417e8b0c132e3cbfd9cfd2c277deec0faf300667 417e8b175df9e949387e632b05369e81aecf0738 417e8b18f0080a47c094022bef62d5118eb9ba9c 417e8b9f5f4f45cc5c9c7393991a0b226ae77d0f 417e8bd1f5c8c49f91d48b06ff8b3d724c1a5157