Streebog

Even a small change in the message will (with overwhelming probability) result in a mostly different hash, due to the avalanche effect.

For example, adding a period to the end of the sentence: In 2013 the Russian Technical Committee for Standardization "Cryptography and Security Mechanisms" (TC 26) with the participation of Academy of Cryptography of the Russian Federation declared an open competition for cryptanalysis of the Streebog hash function,[7] which attracted international attention to the function.

Guo, et al, describe a second preimage attack on full Streebog-512 with total time complexity equivalent to 2266 compression function evaluations, if the message has more than 2259 blocks.

[1] AlTawy and Youssef published an attack to a modified version of Streebog with different round constants.

The designers published a paper explaining that these are pseudorandom constants generated with Streebog-like hash function, provided with 12 different natural language input messages.