From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 91 ee
4191ee02f399d2f9348a0ecfa7f8569b616a06ae 4191ee5244ed33ecf101c75cbaa2a013d538f458 4191ee61fedd28f660960c237189f1d0cc9a82ce 4191eeb3de5c3affa0f72ef9d0ab4a2eb6c043f0 4191eefd6ca44d916a5bc0a92533f8b82cc5f3ad