From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 91 de
4191de0cff6daf559e25a0417142a14f6bd383d9 4191de3907ab37d2e5def8022a45b2645145d62f 4191dea049a06c5d72cf12ff1d791afc8280c161 4191deb444887375c6885a041a5275a2e7cf9017