From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 bf 04
41bf044754104a0408273e78ba403fd09e64e504 41bf0462887f8d491dae8a46c67dd9af8c7fa8fb 41bf04762617d6f5189a2550168f8d7b541be85c 41bf04fe073202f2748ac4ee4c2742c4a0857384