From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 20
37a920675d72fdf15cd48ca67717d305b5854dde 37a920acba60748877621dfffca8747f6e4d2ed8 37a920ba0e49d985495b81c2618e8c61efcbe36d