From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 bb
41b0bb48e85d1c09dd5cffd1f1da02341b6e6acd 41b0bb5e5fca017806d66fdb47eb75077b2ec89b 41b0bbbffdbb8958370dbd147832e82f9ec364fc