From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b7 e1
41b7e1161ac1e70c3e7e7a38527ee9d3d5992085 41b7e165c61ed72a9fc271eabd2c8b53348c4356 41b7e18b8393b47b90fa1742d5d5d264ad7d3430