From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 49
41b0492d710f61d8c73766f699d357f9294533ba 41b0498c5ca25574af37fce3684c1bdbe55e03f5 41b04997ce0ff14ac76093e23a4fd1c799a1639d 41b049dba7db8511c8a952b642c238710ab19c7a