From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b7 3b
41b73b912e449d3b53416a1d34f8db4936d6a1f8 41b73bace0712764ef803ecbb0bab484f44a6a18 41b73bd1e8bf6c8ff07dc7009bb97fc933312ccc 41b73bd2045bd77a213d6e5b5953385a1ec3f442