From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 ed
37a9ed2d94b0efa14d8d691c798e1d4193026ffc 37a9ed5b369e2247d9990d6ba4d00034ccbcdc1f 37a9ed6f5e87ca9ae28b92984d55c888050cc9a6