From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 37 b7 15
37b715b77183b1dc9acac78ce5525e3fb92d4cdc 37b715b7d896c4a2faabf4b151cd610f479c23cb 37b715f667c067b328e744f8c92a6786b6e07df6