From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 ae 66
41ae660617511d1677e73d596d37d8c25d9d0e0d 41ae6614200672b7b3e9dc5e5509aaccc4bb828b 41ae66979005cc221e5b7ea8fd773e7e7ca7a40f 41ae66ff62d1463bd6d15d62e0359cdc88fbf1c5