From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 bc
41b0bc03c6f369bba280c4ec026064658dd11293 41b0bc204e8cb7405b9739061afabeb74cfaf983 41b0bc36c148875342bd39fb938425e64d69a3cc 41b0bc8223f2eb5114e4f995b17653639bb37e53 41b0bca7b04d5af795abb79c8ed91b2e0125b5d0