From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 94 f0
4194f08f4f8c4c8403a5b2481d06a40348ed95dc 4194f0b2d70bc5079ab75d50c8c1a068bb206ffd 4194f0da75d6c0fa2937c8b525f4253b6e4f765f 4194f0de6a374e10ed8bec7364f249616bba15a8