From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 21
41b0210afff8aaa218af3b21267e8cafdded3be1 41b0219b5bb0436071c761d1d41e368eb5f0b8de 41b021a6e4c6524988bfead26d11f6310ede748c