From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 ba 5b
41ba5b23abf99623b061e738edd900118f2f3918 41ba5b3f837c9c69145994892b03e8c17cbd6932 41ba5b6cad72fccb93eafa375cbdd9bf1f4fb2fe 41ba5b8ba658131cf8e8b6343e35072eb55cdfb4