From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 91 32
41913277b894750cbcb3d737e35a8d0be144ae36 41913294a22ed7129a5abb4b8219130e818710e5 419132a155e606fe9cb18144cfa709a88734b1f7