From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 54
37a9540e16ab7ba3be9996bd752b0622dfd2be98 37a95426bc6450d0821701e07a9cf0628ecf9c89 37a954500658b6fbc44c5d1328340dd94e31c8c5 37a954aa86a01b69eaf7f700dd6b6c3f94d8deea 37a954daa54a89410e61db8953aded55531886d6