From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 94 ee
4194ee1f5b3c07265cfde81d8f4b86297d29ce86 4194ee2608c3d8e095fe85b4819c0e91de6ac0fa 4194ee71d0d5bd9ef847c05faba250d0b8c0274f 4194eef5b17889784cae034e18329b69b6f096c3