From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 91 2c
41912c17c9650638d62a6f63d421c3da866eb8ca 41912c43dc8cca4f5092e57355be1c40a0e5f95f 41912cb47f8e4931d8fd2224f424f2581d9c2bb4