From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 58
37a9580f9431b31ceccd51ab0695c9050ff20974 37a958289972164cc7c1d801a20aed0ded7354e6 37a9584587867a55a0c10bc9dd6a90510b31519e 37a958dba1191164ae9615b1f588a606cd87d630