From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 14
41b014751f33e47300ef6679c72a8ea00cff4f31 41b01491eace0cb5aec8052512f5d595da21e10c 41b014cb29b2055a11f224c4cc8f21ed3cd86743 41b014e7386a65075838676026af4d0c3edce43c