yes. and it does crack the password. except there does seem to be a bug as it does mangle up the plaintext.
Code:
epixoip@token:~/oclHashcat-1.02$ ./oclHashcat64.bin -d 1 -n 1 -m 1410 ~/example_hash -a 3 1234567
oclHashcat v1.02 starting...
Hashes: 1 total, 1 unique salts, 1 unique digests
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Applicable Optimizers:
* Zero-Byte
* Precompute-Init
* Precompute-Merkle-Demgard
* Early-Skip
* Not-Iterated
* Appended-Salt
* Single-Hash
* Single-Salt
* Brute-Force
* Scalar-Mode
* Raw-Hash
Watchdog: Temperature abort trigger disabled
Watchdog: Temperature retain trigger disabled
Device #1: Hawaii, 3061MB, 1100Mhz, 44MCU
Device #2: skipped by user
Device #3: skipped by user
Device #4: skipped by user
Device #5: skipped by user
Device #6: skipped by user
Device #7: skipped by user
Device #1: Kernel ./kernels/4098/m1410_a3.Hawaii_1348.5_1348.5 (VM).kernel not found in cache! Building may take a while...
Device #1: Kernel ./kernels/4098/m1410_a3.Hawaii_1348.5_1348.5 (VM).kernel (313240 bytes)
Device #1: Kernel ./kernels/4098/markov_be_v1.Hawaii_1348.5_1348.5 (VM).kernel not found in cache! Building may take a while...
Device #1: Kernel ./kernels/4098/markov_be_v1.Hawaii_1348.5_1348.5 (VM).kernel (85244 bytes)
Device #1: Kernel ./kernels/4098/bzero.Hawaii_1348.5_1348.5 (VM).kernel (30472 bytes)
756d043c22902e67d2696f5bd689a9328828cda937f3fc7a6bdd568c7ea272e4:[@36 Dirty, Ugly and Filthy old men!#]:4321[76
Session.Name...: oclHashcat
Status.........: Cracked
Input.Mode.....: Mask (1234567) [7]
Hash.Target....: 756d043c22902e67d2696f5bd689a9328828cda937f3fc7a6bdd568c7ea272e4:[@36 Dirty, Ugly and Filthy old men!#]
Hash.Type......: sha256($pass.$salt)
Time.Started...: 0 secs
Speed.GPU.#1...: 0 H/s
Recovered......: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.......: 1/1 (100.00%)
Skipped........: 0/1 (0.00%)
Rejected.......: 0/1 (0.00%)
Started: Thu Feb 13 11:13:45 2014
Stopped: Thu Feb 13 11:13:53 2014