From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 37
040337506f5093ea29afdb40ee0ea647d66e785a 040337583e56d7fe24d88da20d2a34abb4e31405 0403376d36d636b7c21638a6e7f27539874a49db 040337a1fdb3be3d3b62f1dab7e629e5acd20afc 040337a5e57143ee9505c427441746a6dd454511