Looking at https://cryptomator.org/security/architecture/ it looks like it is scrypt which is supported by hashcat: https://hashcat.net/wiki/doku.php?id=example_hashes
You will need to figure out how to extract the info from your masterkey.cryptomator file to crack the password. Also scrypt is really really slow. So you should know a fair bit about your password beforehand (length, parts of password, charset, etc).
Edit: Looking closer it seems it would not be a simple port to hashcat, the scrypt result isn't stored and you will need tot test the scrypt results by AES decrypting a key and using it. So I think it will be very hard.
You will need to figure out how to extract the info from your masterkey.cryptomator file to crack the password. Also scrypt is really really slow. So you should know a fair bit about your password beforehand (length, parts of password, charset, etc).
Edit: Looking closer it seems it would not be a simple port to hashcat, the scrypt result isn't stored and you will need tot test the scrypt results by AES decrypting a key and using it. So I think it will be very hard.