From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 4e
41b04e138e1024aed2f22170ca657ae07da45bbb 41b04e59a106debfb992b8d9f5b5cb2e255a103b 41b04e62875cd71ee6185fa25609e97075be6060 41b04eb9aac9744a316a571d614a671ce65e37fc