They would not have used a kinetic energy warhead against Yuzhmash, they either would have used a ground-penetrating conventional explosive or they would have used an empty nose-cone in order to achieve the objectives I described in my previous post. It certainly was not a mere warning shot. They wanted to get the facility to release its digital command codes but needed the facility to remain intact so that the compromised codes could be sent back to an intact facility. From there, cyber-based means can be used to compromise the effectiveness of the facility. For example, all of Ukraine's drones are ultimately linked to a handful of command and control sites including Yuzhmash. If the command and control center can be compromised, the drones themselves can be compromised. Targeting of artillery requires that drones know where they are, have accurate magnetic compass data, etc. so that a GPS coordinate for artillery targeting can be generated. If the drones can be hacked from a compromised command and control center, the firmware of the drones can be tampered with in subtle ways which result in incorrect targeting data being produced.
As Ukraine is now critically low on artillery, they are highly reliant upon hitting targets on the first try. The virus then changes the firmware back to the correct setting before the problem can be troubleshooted, but which point, they've run out of ammunition for the day. This operation was brilliant.