From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 22
37a92257817877cb2df7590428dfc1280d61db14 37a9229f981c3a90452a7640a1263c4668dd7f19 37a922a884a984f4e17e79418790b915f72a8f43 37a922bf88c6132d0f119584580d5015e934f084 37a922f5d7f9f1778751c9d22caec884dda42ae8