From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 5c
37a95c274ecbcca467a8a7b1435e5d74ae41790a 37a95c2dafbb2de0cb53a9a64a7545f5d47f0c07 37a95c74e489fe06fa136b155e9f5c2f60dfc5ec