From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 a9 ff
37a9ff07cdbc4fa41c3334fcc39ea01790cee177 37a9ffc9d61db3c0c533cc943308911d4b5ebccb 37a9ffd1bb2103d0eeb391bb324c20a74d66a560