From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 bb d6
41bbd61f8f0c4485990fabad187fef16b849adf8 41bbd645a696a9c36c0eec80e87e555880935c3b 41bbd651c7c6c2602eec937e75a820b25772453f 41bbd678a3f7df7aae47e04840dd8c90bacc6f7f 41bbd68a3638c33609d79e1f27a1d1107567eb66