From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 47
37a9471f75e71df786b5300fb6d6c5c46718d60a 37a947339f5d7a7f7e2e770af529007697bffb76 37a94759bb6ef6c6988cdc87461e0254ba710c27 37a94759cee1409267cb5cada85ae25dc806099c 37a947e32da05af18c75047b6681773edcd992b8 37a947e4e768e7f20aae370c6820067d6d34b49e