From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 e7
37a9e733376bae55c3f0e04f2eb2d3f299046057 37a9e786b9fa7beabdac4998778a6345bc2aeb7a 37a9e7bb1c7786cafa033136e32b2d33f4ea65cd 37a9e7df5388cbbd19c3a493471f0441c60d3aff