From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 91 e2
4191e22f6372a9cf7ebc8858d823045faec8ae0d 4191e25b2d3039b217138c34df54a77a7f1a2047 4191e26b0cd7c80ea53506fef20e6fcd45d6e295 4191e27ac5ef0de530e3fabef17814121da95335 4191e2d2177ad579c77960d1b08e573b31bfdd7a