From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 fb
37a9fb4b85d5873285a3da1ee415d1793f2ec2e4 37a9fb5d3c926a473b80ea3d4758740ae7c61333 37a9fbfd8b51a5e47f7451aac2862a31efc14921