From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 3d
37a93d4833f7184c3c44f84bcf189fbef48739e1 37a93d57521ff735a4e59f3ca330bbef36f73bf7 37a93d62a2a546783fc2acc91daef2e625dfb650 37a93dab5ec91b9bbcdbed7f0ff68c69412c2250 37a93df74451db79d279ec2ac0e762ff1e433cec