It is known that Rustock has been taken down, but it is always a good idea to understand how a computer is infected with malware, specially if you have to respond to this kind of incidents and/or design the defenses.

This nice post from fireeye blog gives a good overview of how computer can be infected with Rustock.