From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 38
37a93822adee2fa58d70e297af161f1f39ec385d 37a9389de3e710f8bfe25302c90cc1069ccceebe 37a938a67e7a1d30c82ac7f0509012534556df22 37a938c1057ffdb437151a3079e68db7724cd9b6 37a938df37a75bbf69aa97e46c49568ff29d4725