From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 e1
41b0e188874b626c30f1e50d08b5d8a12e29af04 41b0e19c809e7e49fc7964a91c79dbeb24e9fc8a 41b0e1c92c91ca18e7be514f4f1030821dcaec4a 41b0e1d1b56c5a7ac47609302f76d4f338973437