From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 94 ca
4194ca0764270140c8a2a8bb739744eeaa614a79 4194ca49e004f1892bc7881293204cd1a355ba19 4194ca57738d821aed5c4a280fb4825527aa8a0c