From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b3 eb
41b3eb0fd86179deb9ab9459518a4f28716e5ecf 41b3eb2207b45241a2d1786ec6c21456a1262cec 41b3eb3a5081ef9897f47cac32ab8f44b39eaf26 41b3eb5efecc58dcd0d31f87fe2e405b64303e58