From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 4c
37a94c18040a8d828f02763d056af4527fb91618 37a94c4394f57bd182341ef1f64de883d6f48cec 37a94c4e6fffa4e49efcb1ef6af8ce3821372201 37a94cd0b08d6479751af5eb5d2380d8d7c116f1 37a94cd59cec6ed1c616ba1f9c53e530ca6fe5be 37a94cf69219d2144899727254c2df65c731f562