From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b3 61
41b361183b74050bc0379c4ff49e76a417852e9a 41b361378a6bf78079c0af48a2263edad8c57780 41b3616abe56879b1716139dc87dcb929a37b6fc 41b3617b8e2a27a6f2ba91b5a63e7d3285557de3