To brute force 60000 salted passwords with unique salts, you need to run a more complex MD5 algorithm on all the salt + candidate combinations.
Only if the algorithm also includes stretching, which salting by itself does not necessarily do. If that is the case then you're right of course (I haven't downloaded the file to look at what format they use).