From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 2f
41b02f187c6bc0dc9822962e067db12680db19e8 41b02f55ee3755d04ab7d592217c298625f50001 41b02f8ec065b9ff05b024636d200bb7d7c8b6b6 41b02faf663817aba227899b685d566430a22594 41b02fd1797d132bfcdfb9d962a008f14b26e3be