From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 c2
41b0c20daf482a1ff13ecc1a274e82164133dfc2 41b0c2608309f209a1488887986e24ad734862ea 41b0c28a0a608805af673ac830235db8bf0104a8 41b0c2c59c090945ce6da41d49998dec109437b0