From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 94 4b
41944b2b9357a7c7130eaa1caed68ea5a7ac9e7e 41944b5a77d7b31d612d706bed30d6c2fd560049 41944b7a3f2744fc67b00e2f4cf373ebbf075ced 41944bdb0e4c5ed7f39f09e6d9982ba6e20befe2