From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 94 07
41940713868fd38c48b395669f683fd099805553 4194073e97653932a1eac8507c6bc54a1c0365ae 41940788ef9cf82d3f131c19a4bfd95b338323f8 419407d4626335911ea857b72707450bd91b2954 419407dec5747ee2400befc6f5f7b64c1277b95a