From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 6d
41b06d6d015a5a30267c29bef8bb5399e659d207 41b06d8c3f6c07c92729f78d5503f4502cc09a1c 41b06dcc5210dc79883749512932b4297ad9e11d