From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 19
37a919826c082dc3e52e99cc37446cb6ea9013ef 37a919a69b26ea8d665176d6534bba540828c724 37a919ceed859167af419524590e239c7f05b05c 37a919f819bffb173dc82df1b671986fe6a8c041