From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 ea
37a9ea62e07cbee5aff7b1f2e2784ce32a523205 37a9ea79bfc2e0b60ab136839508409d463db5f6 37a9ea9d366bba453d23a7bb02b20110eac06887 37a9eae6f38aae776fbb18da17bd946d36898000