From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 04
41b0045af56296a428f4e40e4bbfa5d4ccb79905 41b0045ccbc53ff69ed728e96275f4128e46f181 41b004bc9b4bd95d6f56120a1647060ffc5b1ed2