From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b8 6a
41b86a19260235fd2e42c5fb3d492aa83f22a513 41b86a844b61258d2069199f794cb53aeb4a23fb 41b86aa846412a8034789663e0b9a033dc5a8d3f 41b86aadcffc91fb7a2aa0f4ff86e9663606fcf9 41b86ae8a80ba260d69268b7fa3c5a1e337225e9