From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 0a
41b00a043d1b62530571acab052050ca1d701dd0 41b00a5ccf200522e6e38b05041f6f1b1f16a810 41b00a9fe05582fde4a102b4353318a433edd8e5