From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 19
41b0190acd42b264e1431c6ff8c8d88f2ab46d08 41b0190ee9abd94f2263776b3781f35a0023186f 41b01926200acd66c97c6b1adf01fba26eddb0aa 41b0192cb497317e3306edee5fe236818b283f1b 41b0194bfdcbeea5c406e824629ea1920c1b8366 41b019a4458db0a4abf4aa807e90e5f57a3e8f19