From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 a7
37a9a741920a6be84f025798a433b2baa7a9f71e 37a9a75d7c939272400d7fe21362a2311da6c00f 37a9a7d4914c65de21fb6702b4a32b0199135e55