From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b7 bb
41b7bb04bb54d9524bf66f232f5085da4f425cf4 41b7bb31324c0d7a0da8a0f9f340f5b616a8d05e 41b7bbc5883809fc6a94333f319f07890a05a61a 41b7bbcb49628705b6d4de187bfa469f2ec28497 41b7bbe308d31ffd910667a4a1a96e53ea482f14