From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 f7
41b0f7084bf7b64f16bbd8614b25f1e0bfaae509 41b0f78d847df1642efda3321618e8a0da68f548 41b0f7ae5211fac4725701679121689e2708c1b6 41b0f7b1e2223952a2499ca3523db41bf248dbb2 41b0f7d53c0f01447f7de8e57f4b3c382a255848 41b0f7f7ea37ad0c9fc6109f1f86a89989cc9ae7