From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 4a
37a94a5735d97d73688c77aa7e48bc60fc839660 37a94a6a64934340f75b7307d56f1a4fefda0bc5 37a94a799f347ff946cf81430ca83923a1c1edee