From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 91 10
41911054d76bc88e6d6b9f1a3b04cd1f66d0af8b 4191105e1562e471ab4e4749443bcb80f15d5808 419110ecb4dcd7fd5ff203269d940dd839e2fba9