From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 bf 47
41bf4725fe01fa7fb6ef34385bc274c0bc2ba019 41bf4739b240e66e1748733fb7461ad6e49d175a 41bf47622a95caa1c0ca2eadc21578133d930008 41bf47f9230acb1702995dbc55a8a9bcb35265a2