From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 ae 3a
41ae3a183f29a9c7d063dd13bebc0353be4768ba 41ae3a4b462bbc88b2de1ba372b8e8969c6c77ec 41ae3ac3eb04b2965bcf817d6bdca00cd8552112