From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b7 d9
41b7d92e9f4e8eaad179528c847444c0d195b6e2 41b7d948d871b80350793376b951839a02f62140 41b7d95d5898aa1065fd15bae0c9e75d03b18097 41b7d97774f7f7861bea52571007ad53e9f378f1