From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 96
37a9962807f99824bdf9a55699070eacac071385 37a9964d20223da71a98c9176eaa5ff74dab9e82 37a996ea194848f11b3e89a0f25c7b4f2f7b7af6