Without more information, I would have a hard time telling you that THIS particular machine you've listed is a C and C botnet controller / host, or simply a machine going by that name. I fact, I have my doubts that it is, at least, solely from the information you've given us, thus far. A name, alone, means little.
What tool did you use to 'scan' the wireless? Where did you come by the name, "CandC"? Can you, at least, give us the first set of MAC address numbers that you left out (between the 00 and 7F) so that we can see who makes the adapter (assuming it's MAC wasn't altered)? What ports does it have open, etc? We have VERY little information, here, to even begin to tell you anything about this box.
Let's assume, for instance, that it IS a C and C botnet box. I'd be hard pressed to think the code would 'advertise' itself as C and C, as usually, they wouldn't want to be detected. It's more likely just a chosen name that someone gave this box. What I'd recommend / propose, is that you take the hostname and IP address, give it to IS&T (unless that's you), at your workplace, and let them find said machine and investigate it. If your work has wifi, then it would be assumed that someone there would be capable of locating the box in question. If not, I think it's time they contract someone who can.
~ hayabusa ~
"All men can see these tactics whereby I conquer,
but what none can see is the strategy out of which victory is evolved."
- Sun Tzu, 'The Art of War'
OSCE, OSCP (Former - GPEN, C|EH - both expiring / expired)