From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 e6
41b0e60b8bb0f995a86bdf4b4f2360cf2389a1bf 41b0e61cede6c64eac4314b1d74ced657bd0195f 41b0e65cb09f541d1e8cdefe7922e75e34d216a9 41b0e6b6ba8b154aca8a3e4754a8d691b0ea9c90 41b0e6bc373005ec40cd433c8439bec0395a6b29