From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 f6
37a9f6046a06610e8e47caaedd8a082cb55de6d2 37a9f60747d736209b31bab5119ba3872611690a 37a9f67ca280ea69fddddeef322cfbc2d491c629 37a9f6eca56b2e854b766aa726d0cebc5ce8eec0 37a9f6f18a7a4001857353118f021eff4be9ffd9