From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b3 4f
41b34f46e970a6aad91b76d079bc3a2c853a0244 41b34f4fc632d3acb6e77d59a2d90be43f0a2642 41b34f5376cc7cc254e13f92d3dd8374d798ff8a 41b34fc660097c508127d2b34265a9fd97be88d8 41b34ffddda96d98f98d790f1d1c8db4260dfac4