From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 91 d8
4191d83e4edfad819346e7a41950b805c283f38c 4191d8757ddb124dc56822a37aba226698c3bd5f 4191d8d4c0af019db1e7d8cfc9596b5517582f2b