From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 53
37a953540ebcf06b209f6e78d2a8b7ac02fe3df1 37a95397ee918e8c3d6a0ae0ef26a82b9c1e84b9 37a953f46772275fe974cb1897fe9b2ae0df2ecf