From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 b5
37a9b55bc39fa1339bfe0ee21bc320e2df73bbd9 37a9b58056dd8de38b5f51a527a9abb508ed55cc 37a9b5b80d10b242ac4549d11dc48c5637c57fe8 37a9b5dcefcd866320a4ae5a39e8a6983f2a6369