From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 e5
37a9e53cd6288a54bb08789d0c5d40747d1ec340 37a9e5c5ed2e762c26aaa9546070794abbcd0f5d 37a9e5fe246adf94ea108840f14510715df44fea