From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 ae 33
41ae33139c9b6375e01bbc21f4ac72a238041ea4 41ae337348d04ae7514f94b481a310f4187def1b 41ae33b0451a101addc1d5114c66d90eb7ee3e11