From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 e9
37a9e9285e907f8f77667cba17e425a617ef9914 37a9e951f39d57267b431bcfeb813e43302afa71 37a9e968eab86037b206a123fc58b0eeefd04d4c 37a9e9c5e8bd44a566fa405fa90c643e4a438bff