Just a quick query to those who have systems with a GPU and, thus, can use the current version of hashcat. When prompted to display its inbuilt help, do you see any reference to the original, classical, DES?
Looking at the legacy version of hashcat, which I use on GPU-less systems, I see the following --
* Hash types:
[[ Roll-your-own: Raw Hashes ]]
900 = MD4
0 = MD5
5100 = Half MD5
100 = SHA1
1400 = SHA-256
1700 = SHA-512
5000 = SHA-3(Keccak)
6900 = GOST R 34.11-94
99999 = Plaintext
[[ Roll-your-own: Iterated and / or Salted Hashes ]]
10 = md5($pass.$salt)
20 = md5($salt.$pass)
30 = md5(unicode($pass).$salt)
40 = md5($salt.unicode($pass))
3800 = md5($salt.$pass.$salt)
3710 = md5($salt.md5($pass))
4110 = md5($salt.md5($pass.$salt))
4010 = md5($salt.md5($salt.$pass))
4210 = md5($username.0.$pass)
3720 = md5($pass.md5($salt))
3500 = md5(md5(md5($pass)))
3610 = md5(md5($salt).$pass)
3910 = md5(md5($pass).md5($salt))
2600 = md5(md5($pass)
4300 = md5(strtoupper(md5($pass)))
4400 = md5(sha1($pass))
110 = sha1($pass.$salt)
120 = sha1($salt.$pass)
130 = sha1(unicode($pass).$salt)
140 = sha1($salt.unicode($pass))
4500 = sha1(sha1($pass)
4600 = sha1(sha1(sha1($pass)))
4700 = sha1(md5($pass))
4900 = sha1($salt.$pass.$salt)
1410 = sha256($pass.$salt)
1420 = sha256($salt.$pass)
1430 = sha256(unicode($pass).$salt)
1440 = sha256($salt.unicode($pass))
1710 = sha512($pass.$salt)
1720 = sha512($salt.$pass)
1730 = sha512(unicode($pass).$salt)
1740 = sha512($salt.unicode($pass))
1431 = base64(sha256(unicode($pass)))
[[ Roll-your-own: Authenticated Hashes ]]
50 = HMAC-MD5 (key = $pass)
60 = HMAC-MD5 (key = $salt)
150 = HMAC-SHA1 (key = $pass)
160 = HMAC-SHA1 (key = $salt)
1450 = HMAC-SHA256 (key = $pass)
1460 = HMAC-SHA256 (key = $salt)
1750 = HMAC-SHA512 (key = $pass)
1760 = HMAC-SHA512 (key = $salt)
[[ Generic KDF ]]
400 = phpass
8900 = scrypt
[[ Network protocols, Challenge-Response ]]
23 = Skype
2500 = WPA/WPA2
4800 = iSCSI CHAP authentication, MD5(Chap)
5300 = IKE-PSK MD5
5400 = IKE-PSK SHA1
5500 = NetNTLMv1
5500 = NetNTLMv1 + ESS
5600 = NetNTLMv2
7300 = IPMI2 RAKP HMAC-SHA1
10200 = Cram MD5
11100 = PostgreSQL Challenge-Response Authentication (MD5)
11200 = MySQL Challenge-Response Authentication (SHA1)
11400 = SIP digest authentication (MD5)
[[ Forums, CMS, E-Commerce, Frameworks, Middleware, Wiki, Management ]]
121 = SMF (Simple Machines Forum)
400 = phpBB3
2611 = vBulletin < v3.8.5
2711 = vBulletin > v3.8.5
2811 = MyBB
2811 = IPB (Invison Power Board)
8400 = WBB3 (Woltlab Burning Board)
11 = Joomla < 2.5.18
400 = Joomla > 2.5.18
400 = Wordpress
2612 = PHPS
7900 = Drupal7
21 = osCommerce
21 = xt:Commerce
11000 = PrestaShop
124 = Django (SHA-1)
10000 = Django (PBKDF2-SHA256)
3711 = Mediawiki B type
7600 = Redmine
3721 = WebEdition CMS
[[ Database Server ]]
12 = PostgreSQL
131 = MSSQL(2000)
132 = MSSQL(2005)
1731 = MSSQL(2012)
1731 = MSSQL(2014)
200 = MySQL323
300 = MySQL4.1/MySQL5
112 = Oracle S: Type (Oracle 11+)
[[ HTTP, SMTP, LDAP Server ]]
123 = EPi
141 = EPiServer 6.x < v4
1441 = EPiServer 6.x > v4
1600 = Apache $apr1$
1421 = hMailServer
101 = nsldap, SHA-1(Base64), Netscape LDAP SHA
111 = nsldaps, SSHA-1(Base64), Netscape LDAP SSHA
1711 = SSHA-512(Base64), LDAP {SSHA512}
[[ Operating-Systems ]]
1000 = NTLM
1100 = Domain Cached Credentials (DCC), MS Cache
500 = md5crypt $1$, MD5(Unix)
3200 = bcrypt $2*$, Blowfish(Unix)
3300 = MD5(Sun)
7400 = sha256crypt $5$, SHA256(Unix)
1800 = sha512crypt $6$, SHA512(Unix)
122 = OSX v10.4
122 = OSX v10.5
122 = OSX v10.6
1722 = OSX v10.7
7100 = OSX v10.8
7100 = OSX v10.9
7100 = OSX v10.10
7100 = OSX v10.11
6300 = AIX {smd5}
6700 = AIX {ssha1}
6400 = AIX {ssha256}
6500 = AIX {ssha512}
2400 = Cisco-PIX
2410 = Cisco-ASA
500 = Cisco-IOS $1$
5700 = Cisco-IOS $4$
9200 = Cisco-IOS $8$
9300 = Cisco-IOS $9$
5800 = Android PIN
7200 = GRUB 2
9900 = Radmin2
7000 = Fortigate (FortiOS)
[[ Enterprise Application Software (EAS) ]]
10300 = SAP CODVN H (PWDSALTEDHASH) iSSHA-1
133 = PeopleSoft
[[ Password Managers ]]
5200 = Password Safe v3
Absolutely no reference to DES.