From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b7 bd
41b7bd20bdb8e4db6998b43e9d457f2e6453cf86 41b7bd36e969e3bb1d2768dc0262ed85aa5a5406 41b7bdbf70768817fa022d0e407dd5e8fe44c8a6