From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 4f
37a94f45a14e73ffcfe77afdc9e42a3982781665 37a94f7062c9a649f1945696dd5c39f6798ffcce 37a94fc8ef13054ab18df43161ee03e2ab9350b0