From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 37 e0
cd37e03cae58a35db5eba82b760499661a9f323d cd37e054f3cf32370d039560530e52f27c540eb8 cd37e0bcdfe15cd7591105dceed195f3b6f7a3ef cd37e0d5e7389a6ede399bb455b3babd8cb68bda cd37e0daad4b476367446315f8368c32d503d3b6