From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 bf
41b0bf556c764fc4b6150d0e99db644e15d00bd4 41b0bfd11ce3c4d37dd38777b0e176e4c6c6584b 41b0bff603ba28a55ad458b37bf2d34e6cbb2eb5 41b0bfff46af982ad70462fc5ef14a71f1ab56ff