From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 bf
37a9bf16ba97fe3ca48b6d2ff750b567595c8736 37a9bf30bd4259b36d848b2bde99f5d38b72a5bb 37a9bf738ed1e0d82f5affb1c46926c3e4ad2929 37a9bfab470d5c075c2fdab3a10ebe54acf115a3 37a9bfac4263a26418ed937e6827b6cd72116122