From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 94 62
4194625efa5d53e5b067f425f0b068d2a429921d 4194629a1e53ab80cbcc90da51b359bee8a04f16 419462d8a4911ee08a5ab9dedc54a63d1dd92285